<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2022-04-29T06:20:08</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:78169" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="754481" ref_url="https://bugzilla.suse.com/754481" source="BUGZILLA"/>
		<reference ref_id="773612" ref_url="https://bugzilla.suse.com/773612" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3438" ref_url="https://www.suse.com/security/cve/CVE-2012-3438/" source="CVE"/>
		<description>

ImageMagick has been updated to fix an integer overflow (CVE-2012-3438).

Also a slowness in 'convert' when resizing JPEG images has been addressed 
(bnc#754481).

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-20"/>
	<updated date="2013-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/754481">SUSE bug 754481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3438/">CVE-2012-3438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565839" comment="ImageMagick-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565840" comment="libMagick++1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565841" comment="libMagickCore1-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565842" comment="libMagickCore1-32bit-6.4.3.6-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565843" comment="libMagickWand1-6.4.3.6-7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78170" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821855" ref_url="https://bugzilla.suse.com/821855" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1993" ref_url="https://www.suse.com/security/cve/CVE-2013-1993/" source="CVE"/>
		<description>

This update of Mesa fixes multiple integer overflows.

Security Issue reference:

    * CVE-2013-1993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821855">SUSE bug 821855</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1993/">CVE-2013-1993</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565844" comment="Mesa-7.11.2-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565845" comment="Mesa-32bit-7.11.2-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78171" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="840485" ref_url="https://bugzilla.suse.com/840485" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<description>

This update to Firefox 17.0.9esr (bnc#840485) addresses:

    * MFSA 2013-91 User-defined properties on DOM proxies get the wrong
      'this' object
          o (CVE-2013-1737)
    * MFSA 2013-90 Memory corruption involving scrolling
          o use-after-free in mozilla::layout::ScrollbarActivity
            (CVE-2013-1735)
          o Memory corruption in nsGfxScrollFrameInner::IsLTR()
            (CVE-2013-1736)
    * MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
          o buffer overflow at nsFloatManager::GetFlowArea() with multicol,
            list, floats (CVE-2013-1732)
    * MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
          o compartment mismatch in nsXBLBinding::DoInitJSClass
            (CVE-2013-1730)
    * MFSA 2013-83 Mozilla Updater does not lock MAR file after signature
      verification
          o MAR signature bypass in Updater could lead to downgrade
            (CVE-2013-1726)
    * MFSA 2013-82 Calling scope for new Javascript objects can lead to
      memory corruption
          o ABORT: bad scope for new JSObjects: ReparentWrapper /
            document.open (CVE-2013-1725)
    * MFSA 2013-79 Use-after-free in Animation Manager during stylesheet
      cloning
          o Heap-use-after-free in nsAnimationManager::BuildAnimations
            (CVE-2013-1722)
    * MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 /
      rv:17.0.9)
          o Memory safety bugs fixed in Firefox 17.0.9 and Firefox 24.0
            (CVE-2013-1718)
    * MFSA 2013-65 Buffer underflow when generating CRMF requests
          o ASAN heap-buffer-overflow (read 1) in
            cryptojs_interpret_key_gen_type (CVE-2013-1705)

Security Issue references:

    * CVE-2013-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737&gt;
    * CVE-2013-1735
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735&gt;
    * CVE-2013-1736
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736&gt;
    * CVE-2013-1732
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732&gt;
    * CVE-2013-1730
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730&gt;
    * CVE-2013-1726
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726&gt;
    * CVE-2013-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725&gt;
    * CVE-2013-1722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722&gt;
    * CVE-2013-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718&gt;
    * CVE-2013-1705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-19"/>
	<updated date="2013-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565846" comment="MozillaFirefox-17.0.9esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565847" comment="MozillaFirefox-translations-17.0.9esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78172" version="1" class="patch">
	<metadata>
		<title>Security update for acroread</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="843835" ref_url="https://bugzilla.suse.com/843835" source="BUGZILLA"/>
		<description>

Adobe has discontinued the support of Adobe Reader for Linux in June 2013.

Newer security problems and bugs are no longer fixed.

As the Adobe Reader is binary only software and we cannot provide a 
replacement, SUSE declares the acroread package of Adobe Reader as being 
out of support and unmaintained.

If you do not need Acrobat Reader, we recommend to uninstall the 'acroread' 
package.

This update removes the Acrobat Reader PDF plugin to avoid automatic 
exploitation by clicking on web pages with embedded PDFs.

The stand alone 'acroread' binary is still available, but again, we do not 
recommend to use it.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/843835">SUSE bug 843835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565848" comment="acroread-9.5.5-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565849" comment="acroread-cmaps-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565850" comment="acroread-fonts-ja-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565851" comment="acroread-fonts-ko-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565852" comment="acroread-fonts-zh_CN-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565853" comment="acroread-fonts-zh_TW-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565854" comment="acroread_ja-9.4.2-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78173" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565855" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565856" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565857" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78174" version="1" class="patch">
	<metadata>
		<title>Security update for bogofilter</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="792939" ref_url="https://bugzilla.suse.com/792939" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468/" source="CVE"/>
		<description>

A heap corruption in bogofilter's base64 decoding function, caused by 
incomplete multibyte characters, could have resulted in a Denial of Service 
(App. crash) or potentially allowed the execution of arbitrary code. This 
has been fixed.

Security Issue reference:

    * CVE-2012-5468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5468&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-05"/>
	<updated date="2012-12-05"/>
	<bugzilla href="https://bugzilla.suse.com/792939">SUSE bug 792939</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565858" comment="bogofilter-1.1.1-174.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78175" version="1" class="patch">
	<metadata>
		<title>Security update for Mono</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="769799" ref_url="https://bugzilla.suse.com/769799" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3382" ref_url="https://www.suse.com/security/cve/CVE-2012-3382/" source="CVE"/>
		<description>

Mono was updated to fix a cross site scripting attack in the System.Web 
class 'forbidden extensions' filtering has been fixed. (CVE-2012-3382)

Security Issue reference:

    * CVE-2012-3382
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3382&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-13"/>
	<updated date="2012-07-13"/>
	<bugzilla href="https://bugzilla.suse.com/769799">SUSE bug 769799</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3382/">CVE-2012-3382</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565859" comment="bytefx-data-mysql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565860" comment="ibm-data-db2-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565861" comment="mono-core-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565862" comment="mono-data-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565863" comment="mono-data-firebird-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565864" comment="mono-data-oracle-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565865" comment="mono-data-postgresql-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565866" comment="mono-data-sqlite-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565867" comment="mono-data-sybase-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565868" comment="mono-devel-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565869" comment="mono-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565870" comment="mono-jscript-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565871" comment="mono-locale-extras-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565872" comment="mono-nunit-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565873" comment="mono-wcf-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565874" comment="mono-web-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565875" comment="mono-winforms-2.6.7-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565876" comment="monodoc-core-2.6.7-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78176" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="817880" ref_url="https://bugzilla.suse.com/817880" source="BUGZILLA"/>
		<reference ref_id="838472" ref_url="https://bugzilla.suse.com/838472" source="BUGZILLA"/>
		<reference ref_id="844720" ref_url="https://bugzilla.suse.com/844720" source="BUGZILLA"/>
		<reference ref_id="848101" ref_url="https://bugzilla.suse.com/848101" source="BUGZILLA"/>
		<reference ref_id="849226" ref_url="https://bugzilla.suse.com/849226" source="BUGZILLA"/>
		<reference ref_id="853021" ref_url="https://bugzilla.suse.com/853021" source="BUGZILLA"/>
		<reference ref_id="853347" ref_url="https://bugzilla.suse.com/853347" source="BUGZILLA"/>
		<reference ref_id="854520" ref_url="https://bugzilla.suse.com/854520" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150/" source="CVE"/>
		<reference ref_id="CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408/" source="CVE"/>
		<reference ref_id="CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475/" source="CVE"/>
		<description>

This update fixes the following security issues with Samba:

    * bnc#844720: DCERPC frag_len not checked (CVE-2013-4408)
    * bnc#853347: winbind pam security problem (CVE-2012-6150)
    * bnc#848101: No access check verification on stream files
      (CVE-2013-4475)

And fixes the following non-security issues:

    * bnc#853021: libsmbclient0 package description contains comments
    * bnc#817880: rpcclient adddriver and setdrive do not set all needed
      registry entries
    * bnc#838472: Client trying to delete print job fails: Samba returns:
      WERR_INVALID_PRINTER_NAME
    * bnc#854520 and bnc#849226: various upstream fixes

Security Issue references:

    * CVE-2012-6150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150&gt;
    * CVE-2013-4408
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408&gt;
    * CVE-2013-4475
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/817880">SUSE bug 817880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838472">SUSE bug 838472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849226">SUSE bug 849226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853021">SUSE bug 853021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854520">SUSE bug 854520</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565877" comment="libldb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565878" comment="libldb1-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565879" comment="libsmbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565880" comment="libsmbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565881" comment="libtalloc1-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565882" comment="libtalloc1-32bit-3.4.3-1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565883" comment="libtalloc2-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565884" comment="libtalloc2-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565885" comment="libtdb1-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565886" comment="libtdb1-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565887" comment="libtevent0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565888" comment="libtevent0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565889" comment="libwbclient0-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565890" comment="libwbclient0-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565891" comment="samba-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565892" comment="samba-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565893" comment="samba-client-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565894" comment="samba-client-32bit-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565895" comment="samba-doc-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565896" comment="samba-krb-printing-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565897" comment="samba-winbind-3.6.3-0.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565898" comment="samba-winbind-32bit-3.6.3-0.33.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78177" version="1" class="patch">
	<metadata>
		<title>Security update for clamav</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="816865" ref_url="https://bugzilla.suse.com/816865" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2020" ref_url="https://www.suse.com/security/cve/CVE-2013-2020/" source="CVE"/>
		<reference ref_id="CVE-2013-2021" ref_url="https://www.suse.com/security/cve/CVE-2013-2021/" source="CVE"/>
		<description>

This update contains clamav 0.97.8 which fixes security issues 
(bnc#816865):

    * CVE-2013-2020: Fix heap corruption
    * CVE-2013-2021: Fix overflow due to PDF key length computation.

Security Issue references:

    * CVE-2013-2020
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020&gt;
    * CVE-2013-2021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/816865">SUSE bug 816865</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2020/">CVE-2013-2020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2021/">CVE-2013-2021</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565899" comment="clamav-0.97.8-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78178" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="758060" ref_url="https://bugzilla.suse.com/758060" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110/" source="CVE"/>
		<description>

This compat-openssl097g rollup update contains various security fixes:

    * CVE-2012-2131,CVE-2012-2110: incorrect integer conversions in OpenSSL
      could have resulted in memory corruption during buffer management
      operations.

Security Issue reference:

    * CVE-2012-2110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565900" comment="compat-openssl097g-0.9.7g-146.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565901" comment="compat-openssl097g-32bit-0.9.7g-146.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78179" version="1" class="patch">
	<metadata>
		<title>Security update for coreutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="796243" ref_url="https://bugzilla.suse.com/796243" source="BUGZILLA"/>
		<reference ref_id="798538" ref_url="https://bugzilla.suse.com/798538" source="BUGZILLA"/>
		<reference ref_id="798541" ref_url="https://bugzilla.suse.com/798541" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<description>

This coreutils update fixes three minor security issues.

    * #798538 - VUL-1: CVE-2013-0221: segmentation fault in 'sort -d' and
      'sort -M' with long line input
    * #796243 - VUL-1: CVE-2013-0222: segmentation fault in 'uniq' with
      long line input
    * #798541 - VUL-1: CVE-2013-0223: segmentation fault in 'join -i' with
      long line input

Security Issue references:

    * CVE-2013-0221
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221&gt;
    * CVE-2013-0222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222&gt;
    * CVE-2013-0223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-17"/>
	<updated date="2013-09-17"/>
	<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565902" comment="coreutils-8.12-6.25.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565903" comment="coreutils-lang-8.12-6.25.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78180" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="789566" ref_url="https://bugzilla.suse.com/789566" source="BUGZILLA"/>
		<reference ref_id="827109" ref_url="https://bugzilla.suse.com/827109" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<description>

The following security issue has been fixed in the CUPS print daemon 
CVE-2012-5519:

The patch adds better default protection against misuse of privileges by 
normal users who have been specifically allowed by root to do cupsd 
configuration changes

The new ConfigurationChangeRestriction cupsd.conf directive specifies the 
level of restriction for cupsd.conf changes that happen via HTTP/IPP 
requests to the running cupsd (e.g. via CUPS web interface or via the 
cupsctl command).

By default certain cupsd.conf directives that deal with filenames, paths, 
and users can no longer be changed via requests to the running cupsd but 
only by manual editing the cupsd.conf file and its default file permissions 
permit only root to write the cupsd.conf file.

Those directives are: ConfigurationChangeRestriction, AccessLog, 
BrowseLDAPCACertFile, CacheDir, ConfigFilePerm, DataDir, DocumentRoot, 
ErrorLog, FileDevice, FontPath, Group, LogFilePerm, PageLog, Printcap, 
PrintcapFormat, PrintcapGUI, RemoteRoot, RequestRoot, ServerBin, 
ServerCertificate, ServerKey, ServerRoot, StateDir, SystemGroup, 
SystemGroupAuthKey, TempDir, User.

The default group of users who are allowed to do cupsd configuration 
changes
via requests to the running cupsd (i.e. the SystemGroup directive in 
cupsd.conf) is set to 'root' only.

Additionally the following bug has been fixed:

    * strip trailing '@REALM' from username for Kerberos authentication
      (CUPS STR#3972 bnc#827109)

Security Issue reference:

    * CVE-2012-5519
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827109">SUSE bug 827109</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565904" comment="cups-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565905" comment="cups-client-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565906" comment="cups-libs-1.3.9-8.46.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565907" comment="cups-libs-32bit-1.3.9-8.46.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78181" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="858673" ref_url="https://bugzilla.suse.com/858673" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015/" source="CVE"/>
		<description>

This update fixes the re-use of wrong HTTP NTLM connections in libcurl. 
(CVE-2014-0015)

Security Issue reference:

    * CVE-2014-0015
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-18"/>
	<updated date="2014-01-18"/>
	<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565908" comment="curl-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565909" comment="libcurl4-7.19.7-1.20.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565910" comment="libcurl4-32bit-7.19.7-1.20.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78182" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="783002" ref_url="https://bugzilla.suse.com/783002" source="BUGZILLA"/>
		<reference ref_id="811934" ref_url="https://bugzilla.suse.com/811934" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266/" source="CVE"/>
		<description>

The ISC DHCP server had a denial of service issue in handling specific DDNS 
requests which could cause a out of memory usage situation. (CVE-2013-2266)

This update also adds a dhcp6-server service template for SuSEfirewall2 
(bnc#783002)

Security Issues:

    * CVE-2013-2266
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-27"/>
	<updated date="2013-03-27"/>
	<bugzilla href="https://bugzilla.suse.com/783002">SUSE bug 783002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811934">SUSE bug 811934</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565911" comment="dhcp-4.2.4.P2-0.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565912" comment="dhcp-client-4.2.4.P2-0.11.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78183" version="1" class="patch">
	<metadata>
		<title>Security update for pidgin</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="804742" ref_url="https://bugzilla.suse.com/804742" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0271" ref_url="https://www.suse.com/security/cve/CVE-2013-0271/" source="CVE"/>
		<reference ref_id="CVE-2013-0272" ref_url="https://www.suse.com/security/cve/CVE-2013-0272/" source="CVE"/>
		<reference ref_id="CVE-2013-0273" ref_url="https://www.suse.com/security/cve/CVE-2013-0273/" source="CVE"/>
		<reference ref_id="CVE-2013-0274" ref_url="https://www.suse.com/security/cve/CVE-2013-0274/" source="CVE"/>
		<description>

pidgin was updated to fix 4 security issues:

    * Fixed a crash when receiving UPnP responses with abnormally long
      values. (CVE-2013-0274, bnc#804742)
    * Fixed a crash in Sametime protocol when a malicious server sends us
      an abnormally long user ID. (CVE-2013-0273, bnc#804742)
    * Fixed a bug where the MXit server or a man-in-the-middle could
      potentially send specially crafted data that could overflow a buffer
      and lead to a crash or remote code execution.(CVE-2013-0272,
      bnc#804742)
    * Fixed a bug where a remote MXit user could possibly specify a local
      file path to be written to. (CVE-2013-0271, bnc#804742)

Security Issue references:

    * CVE-2013-0271
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271&gt;
    * CVE-2013-0272
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272&gt;
    * CVE-2013-0273
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273&gt;
    * CVE-2013-0274
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-27"/>
	<updated date="2013-02-27"/>
	<bugzilla href="https://bugzilla.suse.com/804742">SUSE bug 804742</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0271/">CVE-2013-0271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0272/">CVE-2013-0272</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0273/">CVE-2013-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0274/">CVE-2013-0274</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565913" comment="finch-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565914" comment="libpurple-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565915" comment="libpurple-lang-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565916" comment="libpurple-meanwhile-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565917" comment="libpurple-tcl-2.6.6-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565918" comment="pidgin-2.6.6-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78184" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="777588" ref_url="https://bugzilla.suse.com/777588" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956/" source="CVE"/>
		<reference ref_id="CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970/" source="CVE"/>
		<reference ref_id="CVE-2012-1971" ref_url="https://www.suse.com/security/cve/CVE-2012-1971/" source="CVE"/>
		<reference ref_id="CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972/" source="CVE"/>
		<reference ref_id="CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973/" source="CVE"/>
		<reference ref_id="CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974/" source="CVE"/>
		<reference ref_id="CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975/" source="CVE"/>
		<reference ref_id="CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976/" source="CVE"/>
		<reference ref_id="CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956/" source="CVE"/>
		<reference ref_id="CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957/" source="CVE"/>
		<reference ref_id="CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958/" source="CVE"/>
		<reference ref_id="CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959/" source="CVE"/>
		<reference ref_id="CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960/" source="CVE"/>
		<reference ref_id="CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961/" source="CVE"/>
		<reference ref_id="CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962/" source="CVE"/>
		<reference ref_id="CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963/" source="CVE"/>
		<reference ref_id="CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964/" source="CVE"/>
		<reference ref_id="CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965/" source="CVE"/>
		<reference ref_id="CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966/" source="CVE"/>
		<reference ref_id="CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967/" source="CVE"/>
		<reference ref_id="CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968/" source="CVE"/>
		<reference ref_id="CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969/" source="CVE"/>
		<reference ref_id="CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971/" source="CVE"/>
		<reference ref_id="CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972/" source="CVE"/>
		<reference ref_id="CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973/" source="CVE"/>
		<reference ref_id="CVE-2012-3974" ref_url="https://www.suse.com/security/cve/CVE-2012-3974/" source="CVE"/>
		<reference ref_id="CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975/" source="CVE"/>
		<reference ref_id="CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976/" source="CVE"/>
		<reference ref_id="CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978/" source="CVE"/>
		<reference ref_id="CVE-2012-3979" ref_url="https://www.suse.com/security/cve/CVE-2012-3979/" source="CVE"/>
		<reference ref_id="CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980/" source="CVE"/>
		<description>

MozillaFirefox was updated to 10.0.7ESR release, fixing a lot of bugs and 
security problems.

The following security issues have been addressed:

    * 

      MFSA 2012-57: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-1971: Gary Kwong, Christian Holler, Jesse Ruderman, Steve
      Fink, Bob Clary, Andrew Sutherland, and Jason Smith reported memory
      safety problems and crashes that affect Firefox 14.

    * 

      CVE-2012-1970: Gary Kwong, Christian Holler, Jesse Ruderman, John
      Schoenick, Vladimir Vukicevic and Daniel Holbert reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      14.

    * 

      MFSA 2012-58: Security researcher Abhishek Arya (Inferno) of Google
      Chrome Security Team discovered a series of use-after-free issues
      using the Address Sanitizer tool. Many of these issues are
      potentially exploitable, allowing for remote code execution.

          o Heap-use-after-free in nsHTMLEditor::CollapseAdjacentTextNodes
            CVE-2012-1972
          o Heap-use-after-free in nsObjectLoadingContent::LoadObject
            CVE-2012-1973
          o Heap-use-after-free in gfxTextRun::CanBreakLineBefore
            CVE-2012-1974
          o Heap-use-after-free in PresShell::CompleteMove CVE-2012-1975
          o Heap-use-after-free in nsHTMLSelectElement::SubmitNamesValues
            CVE-2012-1976
          o Heap-use-after-free in MediaStreamGraphThreadRunnable::Run()
            CVE-2012-3956
          o Heap-buffer-overflow in nsBlockFrame::MarkLineDirty
            CVE-2012-3957
          o Heap-use-after-free in nsHTMLEditRules::DeleteNonTableElements
            CVE-2012-3958
          o Heap-use-after-free in nsRangeUpdater::SelAdjDeleteNode
            CVE-2012-3959
          o Heap-use-after-free in mozSpellChecker::SetCurrentDictionary
            CVE-2012-3960
          o Heap-use-after-free in RangeData::~RangeData CVE-2012-3961
          o Bad iterator in text runs CVE-2012-3962
          o use after free in js::gc::MapAllocToTraceKind CVE-2012-3963
          o Heap-use-after-free READ 8 in gfxTextRun::GetUserData
            CVE-2012-3964
    * 

      MFSA 2012-59 / CVE-2012-1956: Security researcher Mariusz Mlynski
      reported that it is possible to shadow the location object using
      Object.defineProperty. This could be used to confuse the current
      location to plugins, allowing for possible cross-site scripting (XSS)
      attacks.

    * 

      MFSA 2012-60 / CVE-2012-3965: Security researcher Mariusz Mlynski
      reported that when a page opens a new tab, a subsequent window can
      then be opened that can be navigated to about:newtab, a chrome
      privileged page. Once about:newtab is loaded, the special context can
      potentially be used to escalate privilege, allowing for arbitrary
      code execution on the local system in a maliciously crafted attack.

    * 

      MFSA 2012-61 / CVE-2012-3966: Security researcher Frederic Hoguin
      reported two related issues with the decoding of bitmap (.BMP) format
      images embedded in icon (.ICO) format files. When processing a
      negative 'height' header value for the bitmap image, a memory
      corruption can be induced, allowing an attacker to write random
      memory and cause a crash. This crash may be potentially exploitable.

    * 

      MFSA 2012-62: Security researcher miaubiz used the Address Sanitizer
      tool to discover two WebGL issues. The first issue is a
      use-after-free when WebGL shaders are called after being destroyed.
      The second issue exposes a problem with Mesa drivers on Linux,
      leading to a potentially exploitable crash.

          o 

            use after free, webgl fragment shader deleted by accessor
            CVE-2012-3968

          o 

            stack scribbling with 4-byte values choosable among a few
            values, when using more than 16 sampler uniforms, on Mesa, with
            all drivers CVE-2012-3967

    * 

      MFSA 2012-63: Security researcher Arthur Gerkis used the Address
      Sanitizer tool to find two issues involving Scalable Vector Graphics
      (SVG) files. The first issue is a buffer overflow in Gecko's SVG
      filter code when the sum of two values is too large to be stored as a
      signed 32-bit integer, causing the function to write past the end of
      an array. The second issue is a use-after-free when an element with a
      'requiredFeatures' attribute is moved between documents. In that
      situation, the internal representation of the 'requiredFeatures'
      value could be freed prematurely. Both issues are potentially
      exploitable.

          o 

            Heap-buffer-overflow in nsSVGFEMorphologyElement::Filter
            CVE-2012-3969

          o 

            Heap-use-after-free in nsTArray_base::Length() CVE-2012-3970

    * 

      MFSA 2012-64 / CVE-2012-3971: Using the Address Sanitizer tool,
      Mozilla security researcher Christoph Diehl discovered two memory
      corruption issues involving the Graphite 2 library used in Mozilla
      products. Both of these issues can cause a potentially exploitable
      crash. These problems were fixed in the Graphite 2 library, which has
      been updated for Mozilla products.

    * 

      MFSA 2012-65 / CVE-2012-3972: Security research Nicolas Gregoire used
      the Address Sanitizer tool to discover an out-of-bounds read in the
      format-number feature of XSLT, which can cause inaccurate formatting
      of numbers and information leakage. This is not directly exploitable.

    * 

      MFSA 2012-66 / CVE-2012-3973: Mozilla security researcher Mark
      Goodwin discovered an issue with the Firefox developer tools'
      debugger. If remote debugging is disabled, but the experimental
      HTTPMonitor extension has been installed and enabled, a remote user
      can connect to and use the remote debugging service through the port
      used by HTTPMonitor. A remote-enabled flag has been added to resolve
      this problem and close the port unless debugging is explicitly
      enabled.

    * 

      MFSA 2012-67 / CVE-2012-3974: Security researcher Masato Kinugawa
      reported that if a crafted executable is placed in the root partition
      on a Windows file system, the Firefox and Thunderbird installer will
      launch this program after a standard installation instead of Firefox
      or Thunderbird, running this program with the user's privileges.

    * 

      MFSA 2012-68 / CVE-2012-3975: Security researcher vsemozhetbyt
      reported that when the DOMParser is used to parse text/html data in a
      Firefox extension, linked resources within this HTML data will be
      loaded. If the data being parsed in the extension is untrusted, it
      could lead to information leakage and can potentially be combined
      with other attacks to become exploitable.

    * 

      MFSA 2012-69 / CVE-2012-3976: Security researcher Mark Poticha
      reported an issue where incorrect SSL certificate information can be
      displayed on the addressbar, showing the SSL data for a previous site
      while another has been loaded. This is caused by two onLocationChange
      events being fired out of the expected order, leading to the
      displayed certificate data to not be updated. This can be used for
      phishing attacks by allowing the user to input form or other data on
      a newer, attacking, site while the credentials of an older site
      appear on the addressbar.

    * 

      MFSA 2012-70 / CVE-2012-3978: Mozilla security researcher
      moz_bug_r_a4 reported that certain security checks in the location
      object can be bypassed if chrome code is called content in a specific
      manner. This allowed for the loading of restricted content. This can
      be combined with other issues to become potentially exploitable.

    * 

      MFSA 2012-71 / CVE-2012-3979: Mozilla developer Blake Kaplan reported
      that __android_log_print is called insecurely in places. If a
      malicious web page used a dump() statement with a specially crafted
      string, it can trigger a potentially exploitable crash.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-72 / CVE-2012-3980: Security researcher Colby Russell
      discovered that eval in the web console can execute injected code
      with chrome privileges, leading to the running of malicious code in a
      privileged context. This allows for arbitrary code execution through
      a malicious web page if the web console is invoked by the user.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-31"/>
	<updated date="2012-08-31"/>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1971/">CVE-2012-1971</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3974/">CVE-2012-3974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3979/">CVE-2012-3979</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565919" comment="MozillaFirefox-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565920" comment="MozillaFirefox-branding-SLED-7-0.6.7.80 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565921" comment="MozillaFirefox-translations-10.0.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565922" comment="libfreebl3-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565923" comment="libfreebl3-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565924" comment="mozilla-nspr-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565925" comment="mozilla-nspr-32bit-4.9.2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565926" comment="mozilla-nss-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565927" comment="mozilla-nss-32bit-3.13.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565928" comment="mozilla-nss-tools-3.13.6-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78185" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="783533" ref_url="https://bugzilla.suse.com/783533" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3977" ref_url="https://www.suse.com/security/cve/CVE-2012-3977/" source="CVE"/>
		<reference ref_id="CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982/" source="CVE"/>
		<reference ref_id="CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983/" source="CVE"/>
		<reference ref_id="CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984/" source="CVE"/>
		<reference ref_id="CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985/" source="CVE"/>
		<reference ref_id="CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986/" source="CVE"/>
		<reference ref_id="CVE-2012-3987" ref_url="https://www.suse.com/security/cve/CVE-2012-3987/" source="CVE"/>
		<reference ref_id="CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988/" source="CVE"/>
		<reference ref_id="CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989/" source="CVE"/>
		<reference ref_id="CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990/" source="CVE"/>
		<reference ref_id="CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991/" source="CVE"/>
		<reference ref_id="CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992/" source="CVE"/>
		<reference ref_id="CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993/" source="CVE"/>
		<reference ref_id="CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994/" source="CVE"/>
		<reference ref_id="CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995/" source="CVE"/>
		<reference ref_id="CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179/" source="CVE"/>
		<reference ref_id="CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180/" source="CVE"/>
		<reference ref_id="CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181/" source="CVE"/>
		<reference ref_id="CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182/" source="CVE"/>
		<reference ref_id="CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183/" source="CVE"/>
		<reference ref_id="CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184/" source="CVE"/>
		<reference ref_id="CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185/" source="CVE"/>
		<reference ref_id="CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186/" source="CVE"/>
		<reference ref_id="CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187/" source="CVE"/>
		<reference ref_id="CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188/" source="CVE"/>
		<reference ref_id="CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192/" source="CVE"/>
		<reference ref_id="CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.9ESR security release which fixes 
bugs and security issues:

    * 

      MFSA 2012-73 / CVE-2012-3977: Security researchers Thai Duong and
      Juliano Rizzo reported that SPDY's request header compression leads
      to information leakage, which can allow the extraction of private
      data such as session cookies, even over an encrypted SSL connection.
      (This does not affect Firefox 10 as it does not feature the SPDY
      extension. It was silently fixed for Firefox 15.)

    * 

      MFSA 2012-74: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      CVE-2012-3983: Henrik Skupin, Jesse Ruderman and moz_bug_r_a4
      reported memory safety problems and crashes that affect Firefox 15.

    * 

      CVE-2012-3982: Christian Holler and Jesse Ruderman reported memory
      safety problems and crashes that affect Firefox ESR 10 and Firefox
      15.

    * 

      MFSA 2012-75 / CVE-2012-3984: Security researcher David Bloom of Cue
      discovered that 'select' elements are always-on-top chromeless
      windows and that navigation away from a page with an active 'select'
      menu does not remove this window.When another menu is opened
      programmatically on a new page, the original 'select' menu can be
      retained and arbitrary HTML content within it rendered, allowing an
      attacker to cover arbitrary portions of the new page through absolute
      positioning/scrolling, leading to spoofing attacks. Security
      researcher Jordi Chancel found a variation that would allow for
      click-jacking attacks was well.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Navigation away from a page with an active 'select' dropdown menu can
      be used for URL spoofing, other evil

      Firefox 10.0.1 : Navigation away from a page with multiple active
      'select' dropdown menu can be used for Spoofing And ClickJacking with
      XPI using window.open and geolocalisation

    * 

      MFSA 2012-76 / CVE-2012-3985: Security researcher Collin Jackson
      reported a violation of the HTML5 specifications for document.domain
      behavior. Specified behavior requires pages to only have access to
      windows in a new document.domain but the observed violation allowed
      pages to retain access to windows from the page's initial origin in
      addition to the new document.domain. This could potentially lead to
      cross-site scripting (XSS) attacks.

    * 

      MFSA 2012-77 / CVE-2012-3986: Mozilla developer Johnny Stenback
      discovered that several methods of a feature used for testing
      (DOMWindowUtils) are not protected by existing security checks,
      allowing these methods to be called through script by web pages. This
      was addressed by adding the existing security checks to these
      methods.

    * 

      MFSA 2012-78 / CVE-2012-3987: Security researcher Warren He reported
      that when a page is transitioned into Reader Mode in Firefox for
      Android, the resulting page has chrome privileges and its content is
      not thoroughly sanitized. A successful attack requires user enabling
      of reader mode for a malicious page, which could then perform an
      attack similar to cross-site scripting (XSS) to gain the privileges
      allowed to Firefox on an Android device. This has been fixed by
      changing the Reader Mode page into an unprivileged page.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2012-79 / CVE-2012-3988: Security researcher Soroush Dalili
      reported that a combination of invoking full screen mode and
      navigating backwards in history could, in some circumstances, cause a
      hang or crash due to a timing dependent use-after-free pointer
      reference. This crash may be potentially exploitable.

    * 

      MFSA 2012-80 / CVE-2012-3989: Mozilla community member Ms2ger
      reported a crash due to an invalid cast when using the instanceof
      operator on certain types of JavaScript objects. This can lead to a
      potentially exploitable crash.

    * 

      MFSA 2012-81 / CVE-2012-3991: Mozilla community member Alice White
      reported that when the GetProperty function is invoked through JSAPI,
      security checking can be bypassed when getting cross-origin
      properties. This potentially allowed for arbitrary code execution.

    * 

      MFSA 2012-82 / CVE-2012-3994: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location and top can be shadowed by Object.defineProperty
      as well. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

    * 

      MFSA 2012-83: Security researcher Mariusz Mlynski reported that when
      InstallTrigger fails, it throws an error wrapped in a Chrome Object
      Wrapper (COW) that fails to specify exposed properties. These can
      then be added to the resulting object by an attacker, allowing access
      to chrome privileged functions through script.

      While investigating this issue, Mozilla security researcher
      moz_bug_r_a4 found that COW did not disallow accessing of properties
      from a standard prototype in some situations, even when the original
      issue had been fixed.

      These issues could allow for a cross-site scripting (XSS) attack or
      arbitrary code execution.

    * 

      CVE-2012-3993: XrayWrapper pollution via unsafe COW

    * 

      CVE-2012-4184: ChromeObjectWrapper is not implemented as intended

    * 

      MFSA 2012-84 / CVE-2012-3992: Security researcher Mariusz Mlynski
      reported an issue with spoofing of the location property. In this
      issue, writes to location.hash can be used in concert with scripted
      history navigation to cause a specific website to be loaded into the
      history object. The baseURI can then be changed to this stored site,
      allowing an attacker to inject a script or intercept posted data
      posted to a location specified with a relative path.

    * 

      MFSA 2012-85: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series of use-after-free,
      buffer overflow, and out of bounds read issues using the Address
      Sanitizer tool in shipped software. These issues are potentially
      exploitable, allowing for remote code execution. We would also like
      to thank Abhishek for reporting two additional use-after-free flaws
      introduced during Firefox 16 development and fixed before general
      release.

    * 

      CVE-2012-3995: Out of bounds read in IsCSSWordSpacingSpace

    * 

      CVE-2012-4179: Heap-use-after-free in
      nsHTMLCSSUtils::CreateCSSPropertyTxn

    * 

      CVE-2012-4180: Heap-buffer-overflow in
      nsHTMLEditor::IsPrevCharInNodeWhitespace

    * 

      CVE-2012-4181: Heap-use-after-free in
      nsSMILAnimationController::DoSample

    * 

      CVE-2012-4182: Heap-use-after-free in nsTextEditRules::WillInsert

    * 

      CVE-2012-4183: Heap-use-after-free in
      DOMSVGTests::GetRequiredFeatures

    * 

      MFSA 2012-86: Security researcher Atte Kettunen from OUSPG reported
      several heap memory corruption issues found using the Address
      Sanitizer tool. These issues are potentially exploitable, allowing
      for remote code execution.

    * 

      CVE-2012-4185: Global-buffer-overflow in nsCharTraits::length

    * 

      CVE-2012-4186: Heap-buffer-overflow in nsWaveReader::DecodeAudioData

    * 

      CVE-2012-4187: Crash with ASSERTION: insPos too small

    * 

      CVE-2012-4188: Heap-buffer-overflow in Convolve3x3

    * 

      MFSA 2012-87 / CVE-2012-3990: Security researcher miaubiz used the
      Address Sanitizer tool to discover a use-after-free in the IME State
      Manager code. This could lead to a potentially exploitable crash.

    * 

      MFSA 2012-89 / CVE-2012-4192 / CVE-2012-4193: Mozilla security
      researcher moz_bug_r_a4 reported a regression where security wrappers
      are unwrapped without doing a security check in defaultValue(). This
      can allow for improper access access to the Location object. In
      versions 15 and earlier of affected products, there was also the
      potential for arbitrary code execution.

Security Issue reference:

    * CVE-2012-3977
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3977&gt;
    * CVE-2012-3982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982&gt;
    * CVE-2012-3983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983&gt;
    * CVE-2012-3984
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984&gt;
    * CVE-2012-3985
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985&gt;
    * CVE-2012-3986
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986&gt;
    * CVE-2012-3987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3987&gt;
    * CVE-2012-3988
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988&gt;
    * CVE-2012-3989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989&gt;
    * CVE-2012-3990
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990&gt;
    * CVE-2012-3991
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991&gt;
    * CVE-2012-3992
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992&gt;
    * CVE-2012-3993
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993&gt;
    * CVE-2012-3994
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994&gt;
    * CVE-2012-3995
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995&gt;
    * CVE-2012-4179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179&gt;
    * CVE-2012-4180
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180&gt;
    * CVE-2012-4181
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181&gt;
    * CVE-2012-4182
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182&gt;
    * CVE-2012-4183
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183&gt;
    * CVE-2012-4184
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184&gt;
    * CVE-2012-4185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185&gt;
    * CVE-2012-4186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186&gt;
    * CVE-2012-4187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187&gt;
    * CVE-2012-4188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188&gt;
    * CVE-2012-4192
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192&gt;
    * CVE-2012-4193
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-15"/>
	<updated date="2012-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3977/">CVE-2012-3977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3987/">CVE-2012-3987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565929" comment="MozillaFirefox-10.0.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565930" comment="MozillaFirefox-branding-SLED-7-0.6.7.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565931" comment="MozillaFirefox-translations-10.0.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78186" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="786522" ref_url="https://bugzilla.suse.com/786522" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194/" source="CVE"/>
		<reference ref_id="CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195/" source="CVE"/>
		<reference ref_id="CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196/" source="CVE"/>
		<description>

MozillaFirefox was updated to the 10.0.10ESR security release.

The following issue has been fixed:

    * 

      MFSA 2012-90: Mozilla has fixed a number of issues related to the
      Location object in order to enhance overall security. Details for
      each of the current fixed issues are below.

      Thunderbird is only affected by window.location issues through RSS
      feeds and extensions that load web content.

    * 

      CVE-2012-4194: Security researcher Mariusz Mlynski reported that the
      true value of window.location could be shadowed by user content
      through the use of the valueOf method, which can be combined with
      some plugins to perform a cross-site scripting (XSS) attack on users.

    * 

      CVE-2012-4195: Mozilla security researcher moz_bug_r_a4 discovered
      that the CheckURL function in window.location can be forced to return
      the wrong calling document and principal, allowing a cross-site
      scripting (XSS) attack. There is also the possibility of gaining
      arbitrary code execution if the attacker can take advantage of an
      add-on that interacts with the page content.

    * 

      CVE-2012-4196: Security researcher Antoine Delignat-Lavaud of the
      PROSECCO research team at INRIA Paris reported the ability to use
      property injection by prototype to bypass security wrapper
      protections on the Location object, allowing the cross-origin reading
      of the Location object.

		</description>
<advisory from="security@suse.de">
	<issued date="2012-10-29"/>
	<updated date="2012-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565932" comment="MozillaFirefox-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565933" comment="MozillaFirefox-translations-10.0.10-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565934" comment="mozilla-nspr-4.9.3-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565935" comment="mozilla-nspr-32bit-4.9.3-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78187" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="790140" ref_url="https://bugzilla.suse.com/790140" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201/" source="CVE"/>
		<reference ref_id="CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202/" source="CVE"/>
		<reference ref_id="CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203/" source="CVE"/>
		<reference ref_id="CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204/" source="CVE"/>
		<reference ref_id="CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205/" source="CVE"/>
		<reference ref_id="CVE-2012-4206" ref_url="https://www.suse.com/security/cve/CVE-2012-4206/" source="CVE"/>
		<reference ref_id="CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207/" source="CVE"/>
		<reference ref_id="CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208/" source="CVE"/>
		<reference ref_id="CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209/" source="CVE"/>
		<reference ref_id="CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210/" source="CVE"/>
		<reference ref_id="CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212/" source="CVE"/>
		<reference ref_id="CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213/" source="CVE"/>
		<reference ref_id="CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214/" source="CVE"/>
		<reference ref_id="CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215/" source="CVE"/>
		<reference ref_id="CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216/" source="CVE"/>
		<reference ref_id="CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217/" source="CVE"/>
		<reference ref_id="CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218/" source="CVE"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830/" source="CVE"/>
		<reference ref_id="CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833/" source="CVE"/>
		<reference ref_id="CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835/" source="CVE"/>
		<reference ref_id="CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836/" source="CVE"/>
		<reference ref_id="CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837/" source="CVE"/>
		<reference ref_id="CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838/" source="CVE"/>
		<reference ref_id="CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839/" source="CVE"/>
		<reference ref_id="CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840/" source="CVE"/>
		<reference ref_id="CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841/" source="CVE"/>
		<reference ref_id="CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842/" source="CVE"/>
		<reference ref_id="CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 10.0.11 ESR security release, which 
fixes various bugs and security issues.

    * 

      MFSA 2012-106: Security researcher miaubiz used the Address Sanitizer
      tool to discover a series critically rated of use-after-free, buffer
      overflow, and memory corruption issues in shipped software. These
      issues are potentially exploitable, allowing for remote code
      execution. We would also like to thank miaubiz for reporting two
      additional use-after-free and memory corruption issues introduced
      during Firefox development that have been fixed before general
      release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o use-after-free when loading html file on osx (CVE-2012-5830)
          o Mesa crashes on certain texImage2D calls involving level&gt;0
            (CVE-2012-5833)
          o integer overflow, invalid write w/webgl bufferdata
            (CVE-2012-5835)

      The following issues have been fixed in Firefox 17:

          o crash in copyTexImage2D with image dimensions too large for
            given level (CVE-2012-5838)
    * 

      MFSA 2012-105: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free and buffer overflow issues using the Address Sanitizer
      tool in shipped software. These issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting five additional use-after-free, out of bounds
      read, and buffer overflow flaws introduced during Firefox development
      that have been fixed before general release.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      The following issues have been fixed in Firefox 17 and ESR 10.0.11:

          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-4214)
          o Heap-use-after-free in nsPlaintextEditor::FireClipboardEvent
            (CVE-2012-4215)
          o Heap-use-after-free in gfxFont::GetFontEntry (CVE-2012-4216)
          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829)
          o heap-buffer-overflow in
            gfxShapedWord::CompressedGlyph::IsClusterStart
          o CVE-2012-5839
          o Heap-use-after-free in nsTextEditorState::PrepareEditor
            (CVE-2012-5840)

      The following issues have been fixed in Firefox 17:

          o Heap-use-after-free in XPCWrappedNative::Mark (CVE-2012-4212)
          o Heap-use-after-free in nsEditor::FindNextLeafNode
            (CVE-2012-4213)
          o Heap-use-after-free in nsViewManager::ProcessPendingUpdates
            (CVE-2012-4217)
          o Heap-use-after-free BuildTextRunsScanner::BreakSink::SetBreaks
            (CVE-2012-4218)
    * 

      MFSA 2012-104 / CVE-2012-4210: Security researcher Mariusz Mlynski
      reported that when a maliciously crafted stylesheet is inspected in
      the Style Inspector, HTML and CSS can run in a chrome privileged
      context without being properly sanitized first. This can lead to
      arbitrary code execution.

    * 

      MFSA 2012-103 / CVE-2012-4209: Security researcher Mariusz Mlynski
      reported that the location property can be accessed by binary plugins
      through top.location with a frame whose name attribute's value is set
      to 'top'. This can allow for possible cross-site scripting (XSS)
      attacks through plugins.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-102 / CVE-2012-5837: Security researcher Masato Kinugawa
      reported that when script is entered into the Developer Toolbar, it
      runs in a chrome privileged context. This allows for arbitrary code
      execution or cross-site scripting (XSS) if a user can be convinced to
      paste malicious code into the Developer Toolbar.

    * 

      MFSA 2012-101 / CVE-2012-4207: Security researcher Masato Kinugawa
      found when HZ-GB-2312 charset encoding is used for text, the '~'
      character will destroy another character near the chunk delimiter.
      This can lead to a cross-site scripting (XSS) attack in pages encoded
      in HZ-GB-2312.

    * 

      MFSA 2012-100 / CVE-2012-5841: Mozilla developer Bobby Holley
      reported that security wrappers filter at the time of property
      access, but once a function is returned, the caller can use this
      function without further security checks. This affects cross-origin
      wrappers, allowing for write actions on objects when only read
      actions should be properly allowed. This can lead to cross-site
      scripting (XSS) attacks.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-99 / CVE-2012-4208: Mozilla developer Peter Van der Beken
      discovered that same-origin XrayWrappers expose chrome-only
      properties even when not in a chrome compartment. This can allow web
      content to get properties of DOM objects that are intended to be
      chrome-only.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-98 / CVE-2012-4206: Security researcher Robert Kugler
      reported that when a specifically named DLL file on a Windows
      computer is placed in the default downloads directory with the
      Firefox installer, the Firefox installer will load this DLL when it
      is launched. In circumstances where the installer is run by an
      administrator privileged account, this allows for the downloaded DLL
      file to be run with administrator privileges. This can lead to
      arbitrary code execution from a privileged account.

    * 

      MFSA 2012-97 / CVE-2012-4205: Mozilla developer Gabor Krizsanits
      discovered that XMLHttpRequest objects created within sandboxes have
      the system principal instead of the sandbox principal. This can lead
      to cross-site request forgery (CSRF) or information theft via an
      add-on running untrusted code in a sandbox.

    * 

      MFSA 2012-96 / CVE-2012-4204: Security researcher Scott Bell of
      Security-Assessment.com used the Address Sanitizer tool to discover a
      memory corruption in str_unescape in the Javascript engine. This
      could potentially lead to arbitrary code execution.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products.

    * 

      MFSA 2012-95 / CVE-2012-4203: Security researcher kakzz.ng@gmail.com
      reported that if a javascript: URL is selected from the list of
      Firefox 'new tab' page, the script will inherit the privileges of the
      privileged 'new tab' page. This allows for the execution of locally
      installed programs if a user can be convinced to save a bookmark of a
      malicious javascript: URL.

    * 

      MFSA 2012-94 / CVE-2012-5836: Security researcher Jonathan Stephens
      discovered that combining SVG text on a path with the setting of CSS
      properties could lead to a potentially exploitable crash.

    * 

      MFSA 2012-93 / CVE-2012-4201: Mozilla security researcher
      moz_bug_r_a4 reported that if code executed by the evalInSandbox
      function sets location.href, it can get the wrong subject principal
      for the URL check, ignoring the sandbox's Javascript context and
      gaining the context of evalInSandbox object. This can lead to
      malicious web content being able to perform a cross-site scripting
      (XSS) attack or stealing a copy of a local file if the user has
      installed an add-on vulnerable to this attack.

    * 

      MFSA 2012-92 / CVE-2012-4202: Security researcher Atte Kettunen from
      OUSPG used the Address Sanitizer tool to discover a buffer overflow
      while rendering GIF format images. This issue is potentially
      exploitable and could lead to arbitrary code execution.

    * 

      MFSA 2012-91: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      In general these flaws cannot be exploited through email in the
      Thunderbird and SeaMonkey products because scripting is disabled, but
      are potentially a risk in browser or browser-like contexts in those
      products. References

      Gary Kwong, Jesse Ruderman, Christian Holler, Bob Clary, Kyle Huey,
      Ed Morley, Chris Lord, Boris Zbarsky, Julian Seward, and Bill
      McCloskey reported memory safety problems and crashes that affect
      Firefox 16. (CVE-2012-5843)

      Jesse Ruderman, Andrew McCreight, Bob Clary, and Kyle Huey reported
      memory safety problems and crashes that affect Firefox ESR 10 and
      Firefox 16. (CVE-2012-5842)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4206/">CVE-2012-4206</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565936" comment="MozillaFirefox-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565937" comment="MozillaFirefox-translations-10.0.11-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565938" comment="libfreebl3-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565939" comment="libfreebl3-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565940" comment="mozilla-nss-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565941" comment="mozilla-nss-32bit-3.14-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565942" comment="mozilla-nss-tools-3.14-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78188" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="796895" ref_url="https://bugzilla.suse.com/796895" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743/" source="CVE"/>
		<reference ref_id="CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744/" source="CVE"/>
		<reference ref_id="CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745/" source="CVE"/>
		<reference ref_id="CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746/" source="CVE"/>
		<reference ref_id="CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747/" source="CVE"/>
		<reference ref_id="CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748/" source="CVE"/>
		<reference ref_id="CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749/" source="CVE"/>
		<reference ref_id="CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750/" source="CVE"/>
		<reference ref_id="CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751/" source="CVE"/>
		<reference ref_id="CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752/" source="CVE"/>
		<reference ref_id="CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753/" source="CVE"/>
		<reference ref_id="CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754/" source="CVE"/>
		<reference ref_id="CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755/" source="CVE"/>
		<reference ref_id="CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756/" source="CVE"/>
		<reference ref_id="CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757/" source="CVE"/>
		<reference ref_id="CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758/" source="CVE"/>
		<reference ref_id="CVE-2013-0759" ref_url="https://www.suse.com/security/cve/CVE-2013-0759/" source="CVE"/>
		<reference ref_id="CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760/" source="CVE"/>
		<reference ref_id="CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761/" source="CVE"/>
		<reference ref_id="CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762/" source="CVE"/>
		<reference ref_id="CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763/" source="CVE"/>
		<reference ref_id="CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764/" source="CVE"/>
		<reference ref_id="CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766/" source="CVE"/>
		<reference ref_id="CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767/" source="CVE"/>
		<reference ref_id="CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768/" source="CVE"/>
		<reference ref_id="CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769/" source="CVE"/>
		<reference ref_id="CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770/" source="CVE"/>
		<reference ref_id="CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 10.0.12ESR release.

    * 

      MFSA 2013-01: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

          o Christoph Diehl, Christian Holler, Mats Palmgren, and Chiaki
            Ishikawa reported memory safety problems and crashes that
            affect Firefox ESR 10, Firefox ESR 17, and Firefox 17. (
            CVE-2013-0769
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769&gt; 
            )
          o Bill Gianopoulos, Benoit Jacob, Christoph Diehl, Christian
            Holler, Gary Kwong, Robert O'Callahan, and Scoobidiver reported
            memory safety problems and crashes that affect Firefox ESR 17
            and Firefox 17. (CVE-2013-0749
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749&gt; 
            )
          o Jesse Ruderman, Christian Holler, Julian Seward, and
            Scoobidiver reported memory safety problems and crashes that
            affect Firefox 17. (CVE-2013-0770
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770&gt; 
            )
    * 

      MFSA 2013-02: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team discovered a series critically rated of
      use-after-free, out of bounds read, and buffer overflow issues using
      the Address Sanitizer tool in shipped software. These issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting three additional
      user-after-free and out of bounds read flaws introduced during
      Firefox development that were fixed before general release.

      The following issue was fixed in Firefox 18:

          o Global-buffer-overflow in
            CharDistributionAnalysis::HandleOneChar (CVE-2013-0760
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760&gt; 
            )

      The following issues were fixed in Firefox 18, ESR 17.0.1, and ESR
      10.0.12:

          o Heap-use-after-free in imgRequest::OnStopFrame (CVE-2013-0762
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762&gt; 
            )
          o Heap-use-after-free in ~nsHTMLEditRules (CVE-2013-0766
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766&gt; 
            )
          o Out of bounds read in nsSVGPathElement::GetPathLengthScale (
            CVE-2013-0767
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767&gt; 
            )

      The following issues were fixed in Firefox 18 and ESR 17.0.1:

          o Heap-use-after-free in mozilla::TrackUnionStream::EndTrack (
            CVE-2013-0761
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761&gt; 
            )
          o Heap-use-after-free in Mesa, triggerable by resizing a WebGL
            canvas (CVE-2013-0763
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763&gt; 
            )
          o Heap-buffer-overflow in gfxTextRun::ShrinkToLigatureBoundaries
            (CVE-2013-0771
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771&gt; 
            )

      The following issue was fixed in Firefox 18 and in the earlier ESR
      10.0.11 release:

          o Heap-buffer-overflow in nsWindow::OnExposeEvent (CVE-2012-5829
            &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829&gt; 
            )
    * 

      MFSA 2013-03: Security researcher miaubiz used the Address Sanitizer
      tool to discover a buffer overflow in Canvas when specific bad height
      and width values were given through HTML. This could lead to a
      potentially exploitable crash. (CVE-2013-0768
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768&gt; )

      Miaubiz also found a potentially exploitable crash when 2D and 3D
      content was mixed which was introduced during Firefox development and
      fixed before general release.

    * 

      MFSA 2013-04: Security researcher Masato Kinugawa found a flaw in
      which the displayed URL values within the addressbar can be spoofed
      by a page during loading. This allows for phishing attacks where a
      malicious page can spoof the identify of another site. (
      CVE-2013-0759
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759&gt; )

    * 

      MFSA 2013-05: Using the Address Sanitizer tool, security researcher
      Atte Kettunen from OUSPG discovered that the combination of large
      numbers of columns and column groups in a table could cause the array
      containing the columns during rendering to overwrite itself. This can
      lead to a user-after-free causing a potentially exploitable crash. (
      CVE-2013-0744
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744&gt; )

    * 

      MFSA 2013-06: Mozilla developer Wesley Johnston reported that when
      there are two or more iframes on the same HTML page, an iframe is
      able to see the touch events and their targets that occur within the
      other iframes on the page. If the iframes are from the same origin,
      they can also access the properties and methods of the targets of
      other iframes but same-origin policy (SOP) restricts access across
      domains. This allows for information leakage and possibilities for
      cross-site scripting (XSS) if another vulnerability can be used to
      get around SOP restrictions. (CVE-2013-0751
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751&gt; )

    * 

      MFSA 2013-07: Mozilla community member Jerry Baker reported a
      crashing issue found through Thunderbird when downloading messages
      over a Secure Sockets Layer (SSL) connection. This was caused by a
      bug in the networking code assuming that secure connections were
      entirely handled on the socket transport thread when they can occur
      on a variety of threads. The resulting crash was potentially
      exploitable. (CVE-2013-0764
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764&gt; )

    * 

      MFSA 2013-08: Mozilla developer Olli Pettay discovered that the
      AutoWrapperChanger class fails to keep some javascript objects alive
      during garbage collection. This can lead to an exploitable crash
      allowing for arbitrary code execution. (CVE-2013-0745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745&gt; )

    * 

      MFSA 2013-09: Mozilla developer Boris Zbarsky reported reported a
      problem where jsval-returning quickstubs fail to wrap their return
      values, causing a compartment mismatch. This mismatch can cause
      garbage collection to occur incorrectly and lead to a potentially
      exploitable crash. (CVE-2013-0746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746&gt; )

    * 

      MFSA 2013-10: Mozilla security researcher Jesse Ruderman reported
      that events in the plugin handler can be manipulated by web content
      to bypass same-origin policy (SOP) restrictions. This can allow for
      clickjacking on malicious web pages. (CVE-2013-0747
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747&gt; )

    * 

      MFSA 2013-11: Mozilla security researcher Jesse Ruderman discovered
      that using the toString function of XBL objects can lead to
      inappropriate information leakage by revealing the address space
      layout instead of just the ID of the object. This layout information
      could potentially be used to bypass ASLR and other security
      protections. (CVE-2013-0748
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748&gt; )

    * 

      MFSA 2013-12: Security researcher pa_kt reported a flaw via
      TippingPoint's Zero Day Initiative that an integer overflow is
      possible when calculating the length for a Javascript string
      concatenation, which is then used for memory allocation. This results
      in a buffer overflow, leading to a potentially exploitable memory
      corruption. (CVE-2013-0750
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750&gt; )

    * 

      MFSA 2013-13: Security researcher Sviatoslav Chagaev reported that
      when using an XBL file containing multiple XML bindings with SVG
      content, a memory corruption can occur. In concern with remote XUL,
      this can lead to an exploitable crash. (CVE-2013-0752
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752&gt; )

    * 

      MFSA 2013-14: Security researcher Mariusz Mlynski reported that it is
      possible to change the prototype of an object and bypass Chrome
      Object Wrappers (COW) to gain access to chrome privileged functions.
      This could allow for arbitrary code execution. (CVE-2013-0757
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757&gt; )

    * 

      MFSA 2013-15: Security researcher Mariusz Mlynski reported that it is
      possible to open a chrome privileged web page through plugin objects
      through interaction with SVG elements. This could allow for arbitrary
      code execution. (CVE-2013-0758
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758&gt; )

    * 

      MFSA 2013-16: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free in XMLSerializer
      by the exposing of serializeToStream to web content. This can lead to
      arbitrary code execution when exploited. (CVE-2013-0753
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753&gt; )

    * 

      MFSA 2013-17: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free within the
      ListenerManager when garbage collection is forced after data in
      listener objects have been allocated in some circumstances. This
      results in a use-after-free which can lead to arbitrary code
      execution. (CVE-2013-0754
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754&gt; )

    * 

      MFSA 2013-18: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a use-after-free using the domDoc
      pointer within Vibrate library. This can lead to arbitrary code
      execution when exploited. (CVE-2013-0755
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755&gt; )

    * 

      MFSA 2013-19: Security researcher regenrecht reported, via
      TippingPoint's Zero Day Initiative, a garbage collection flaw in
      Javascript Proxy objects. This can lead to a use-after-free leading
      to arbitrary code execution. (CVE-2013-0756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756&gt; )

    * 

      MFSA 2013-20: Google reported to Mozilla that TURKTRUST, a
      certificate authority in Mozilla's root program, had mis-issued two
      intermediate certificates to customers. The issue was not specific to
      Firefox but there was evidence that one of the certificates was used
      for man-in-the-middle (MITM) traffic management of domain names that
      the customer did not legitimately own or control. This issue was
      resolved by revoking the trust for these specific mis-issued
      certificates. (CVE-2013-0743
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-10"/>
	<updated date="2013-01-10"/>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0759/">CVE-2013-0759</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565943" comment="MozillaFirefox-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565944" comment="MozillaFirefox-translations-10.0.12-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565945" comment="libfreebl3-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565946" comment="libfreebl3-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565947" comment="mozilla-nspr-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565948" comment="mozilla-nspr-32bit-4.9.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565949" comment="mozilla-nss-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565950" comment="mozilla-nss-32bit-3.14.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565951" comment="mozilla-nss-tools-3.14.1-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78189" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="808243" ref_url="https://bugzilla.suse.com/808243" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.4ESR release which fixes one 
important security issue:

    * MFSA 2013-29 / CVE-2013-0787: VUPEN Security, via TippingPoint's Zero
      Day Initiative, reported a use-after-free within the HTML editor when
      content script is run by the document.execCommand() function while
      internal editor operations are occurring. This could allow for
      arbitrary code execution.

Security Issue reference:

    * CVE-2013-0787
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-11"/>
	<updated date="2013-03-11"/>
	<bugzilla href="https://bugzilla.suse.com/808243">SUSE bug 808243</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565952" comment="MozillaFirefox-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565953" comment="MozillaFirefox-branding-SLED-7-0.6.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565954" comment="MozillaFirefox-translations-17.0.4esr-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565955" comment="beagle-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565956" comment="beagle-evolution-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565957" comment="beagle-firefox-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565958" comment="beagle-gui-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565959" comment="beagle-lang-0.3.8-56.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565960" comment="libfreebl3-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565961" comment="libfreebl3-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565962" comment="mhtml-firefox-0.5-1.47.51.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565963" comment="mozilla-nspr-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565964" comment="mozilla-nspr-32bit-4.9.5-0.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565965" comment="mozilla-nss-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565966" comment="mozilla-nss-32bit-3.14.2-0.4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565967" comment="mozilla-nss-tools-3.14.2-0.4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78190" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789/" source="CVE"/>
		<reference ref_id="CVE-2013-0790" ref_url="https://www.suse.com/security/cve/CVE-2013-0790/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0798" ref_url="https://www.suse.com/security/cve/CVE-2013-0798/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 17.0.5ESR release fixing bugs and 
security issues.

Also Mozilla NSS has been updated to version 3.14.3 and Mozilla NSPR to 
4.9.6.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

      Andrew McCreight, Randell Jesup, Gary Kwong, Jesse Ruderman,
      Christian Holler, and Mats Palmgren reported memory safety problems
      and crashes that affect Firefox 19. (CVE-2013-0789)

      Jim Chen reported a memory safety problem that affects Firefox for
      Android

    * 

      (CVE-2013-0790)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-33 / CVE-2013-0798: Security researcher Shuichiro Suzuki of
      the Fourteenforty Research Institute reported the app_tmp directory
      is set to be world readable and writeable by Firefox for Android.
      This potentially allows for third party applications to replace or
      alter Firefox add-ons when downloaded because they are temporarily
      stored in the app_tmp directory before installation.

      This vulnerability only affects Firefox for Android.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-079: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789&gt;
    * CVE-2013-0790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0790&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-04"/>
	<updated date="2013-04-04"/>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0790/">CVE-2013-0790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0798/">CVE-2013-0798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565968" comment="MozillaFirefox-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565969" comment="MozillaFirefox-branding-SLED-7-0.6.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565970" comment="MozillaFirefox-translations-17.0.5esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565971" comment="libfreebl3-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565972" comment="libfreebl3-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565973" comment="mozilla-nspr-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565974" comment="mozilla-nspr-32bit-4.9.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565975" comment="mozilla-nss-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565976" comment="mozilla-nss-32bit-3.14.3-0.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565977" comment="mozilla-nss-tools-3.14.3-0.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78191" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788/" source="CVE"/>
		<reference ref_id="CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791/" source="CVE"/>
		<reference ref_id="CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792/" source="CVE"/>
		<reference ref_id="CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793/" source="CVE"/>
		<reference ref_id="CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794/" source="CVE"/>
		<reference ref_id="CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795/" source="CVE"/>
		<reference ref_id="CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796/" source="CVE"/>
		<reference ref_id="CVE-2013-0797" ref_url="https://www.suse.com/security/cve/CVE-2013-0797/" source="CVE"/>
		<reference ref_id="CVE-2013-0799" ref_url="https://www.suse.com/security/cve/CVE-2013-0799/" source="CVE"/>
		<reference ref_id="CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the17.0.6ESR security release.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

Security Issue references:

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0793
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-17"/>
	<updated date="2013-05-17"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0797/">CVE-2013-0797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0799/">CVE-2013-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565978" comment="MozillaFirefox-17.0.6esr-0.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565979" comment="MozillaFirefox-translations-17.0.6esr-0.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78192" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, fixing bugs and 
security fixes.

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

Security Issue references:

    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-28"/>
	<updated date="2013-06-28"/>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565980" comment="MozillaFirefox-17.0.7esr-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565981" comment="MozillaFirefox-branding-SLED-7-0.6.9.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565982" comment="MozillaFirefox-translations-17.0.7esr-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78193" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 17.0.10ESR release, fixing various bugs 
and security issues:

MFSA 2013-93: Mozilla developers identified and fixed several memory safety 
bugs in the browser engine used in Firefox and other Mozilla-based 
products. Some of these bugs showed evidence of memory corruption under 
certain circumstances, and we presume that with enough effort at least some 
of these could be exploited to run arbitrary code.

Jesse Ruderman and Christoph Diehl reported memory safety problems and 
crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox 24. 
(CVE-2013-5590)

Carsten Book reported a crash fixed in the NSS library used by 
Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and Firefox 
ESR 17.0.10.(CVE-2013-1739)

MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya (Inferno) 
of the Google Chrome Security Team used the Address Sanitizer tool to 
discover an access violation due to uninitialized data during Extensible 
Stylesheet Language Transformation (XSLT) processing. This leads to a 
potentially exploitable crash.

MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google 
discovered a flaw in the JavaScript engine where memory was being 
incorrectly allocated for some functions and the calls for allocations were 
not always properly checked for overflow, leading to potential buffer 
overflows. When combined with other vulnerabilities, these flaws could be 
potentially exploitable.

MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of 
Georgia Tech Information Security Center (GTISC) used the Address Sanitizer 
tool to discover a use-after-free during state change events while updating 
the offline cache. This leads to a potentially exploitable crash.

MFSA 2013-100: Security researcher Nils used the Address Sanitizer tool 
while fuzzing to discover missing strong references in browsing engine 
leading to use-after-frees. This can lead to a potentially exploitable 
crash.

    * ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
      canvas, onresize and mozTextStyle (CVE-2013-5599)
    * ASAN use-after-free in nsIOService::NewChannelFromURIWithProxyFlags
      with Blob URL (CVE-2013-5600)
    * ASAN use-after free in GC allocation in
      nsEventListenerManager::SetEventHandler (CVE-2013-5601)

MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the Address 
Sanitizer tool while fuzzing to discover a memory corruption issue with the 
JavaScript engine when using workers with direct proxies. This results in a 
potentially exploitable crash.

Security Issues:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-09"/>
	<updated date="2013-11-09"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565983" comment="MozillaFirefox-17.0.10esr-0.4.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565984" comment="MozillaFirefox-branding-SLED-7-0.6.9.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565985" comment="MozillaFirefox-translations-17.0.10esr-0.4.2.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78194" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="862288" ref_url="https://bugzilla.suse.com/862288" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0497" ref_url="https://www.suse.com/security/cve/CVE-2014-0497/" source="CVE"/>
		<description>

This update resolves an integer underflow vulnerability that could have 
been exploited to execute arbitrary code on the affected system 
(CVE-2014-0497).

More information: 
http://helpx.adobe.com/security/products/flash-player/apsb14-04.html
&lt;http://helpx.adobe.com/security/products/flash-player/apsb14-04.html&gt;

Security Issue references:

    * CVE-2014-0497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0497&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-06"/>
	<updated date="2014-02-06"/>
	<bugzilla href="https://bugzilla.suse.com/862288">SUSE bug 862288</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0497/">CVE-2014-0497</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565986" comment="flash-player-11.2.202.336-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565987" comment="flash-player-gnome-11.2.202.336-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565988" comment="flash-player-kde4-11.2.202.336-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78195" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="795826" ref_url="https://bugzilla.suse.com/795826" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668/" source="CVE"/>
		<reference ref_id="CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669/" source="CVE"/>
		<description>

This update fixes:

    * OOB access in bdf_free_font() and _bdf_parse_glyphs() (CVE-2012-5668
      and CVE-2012-5669)

As well as the following non-security bugs:

    * [bdf] Savannah bug #37905.
          o src/bdf/bdflib.c (_bdf_parse_start): Reset `props_size' to zero
            in case of allocation error; this value gets used in a loop in
    * [bdf] Fix Savannah bug #37906.
          o src/bdf/bdflib.c (_bdf_parse_glyphs): Use correct array size
            for checking `glyph_enc'.

Security Issue references:

    * CVE-2012-5668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668&gt;
    * CVE-2012-5669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-15"/>
	<updated date="2013-01-15"/>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565989" comment="freetype2-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565990" comment="freetype2-32bit-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565991" comment="freetype2-devel-2.3.7-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565992" comment="ft2demos-2.3.7-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78196" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="779700" ref_url="https://bugzilla.suse.com/779700" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4405" ref_url="https://www.suse.com/security/cve/CVE-2012-4405/" source="CVE"/>
		<description>

This update fixes an array index error leading to a heap-based buffer 
overflow in ghostscript-library. CVE-2012-4405 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2012-4405
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-12"/>
	<updated date="2012-09-12"/>
	<bugzilla href="https://bugzilla.suse.com/779700">SUSE bug 779700</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4405/">CVE-2012-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565993" comment="ghostscript-fonts-other-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565994" comment="ghostscript-fonts-rus-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565995" comment="ghostscript-fonts-std-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565996" comment="ghostscript-library-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565997" comment="ghostscript-omni-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565998" comment="ghostscript-x11-8.62-32.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565999" comment="libgimpprint-4.2.7-32.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78197" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="691365" ref_url="https://bugzilla.suse.com/691365" source="BUGZILLA"/>
		<reference ref_id="779320" ref_url="https://bugzilla.suse.com/779320" source="BUGZILLA"/>
		<reference ref_id="791928" ref_url="https://bugzilla.suse.com/791928" source="BUGZILLA"/>
		<reference ref_id="801246" ref_url="https://bugzilla.suse.com/801246" source="BUGZILLA"/>
		<reference ref_id="811979" ref_url="https://bugzilla.suse.com/811979" source="BUGZILLA"/>
		<reference ref_id="813121" ref_url="https://bugzilla.suse.com/813121" source="BUGZILLA"/>
		<reference ref_id="818628" ref_url="https://bugzilla.suse.com/818628" source="BUGZILLA"/>
		<reference ref_id="819347" ref_url="https://bugzilla.suse.com/819347" source="BUGZILLA"/>
		<reference ref_id="822210" ref_url="https://bugzilla.suse.com/822210" source="BUGZILLA"/>
		<reference ref_id="827811" ref_url="https://bugzilla.suse.com/827811" source="BUGZILLA"/>
		<reference ref_id="828235" ref_url="https://bugzilla.suse.com/828235" source="BUGZILLA"/>
		<reference ref_id="828637" ref_url="https://bugzilla.suse.com/828637" source="BUGZILLA"/>
		<reference ref_id="830268" ref_url="https://bugzilla.suse.com/830268" source="BUGZILLA"/>
		<reference ref_id="834594" ref_url="https://bugzilla.suse.com/834594" source="BUGZILLA"/>
		<reference ref_id="839870" ref_url="https://bugzilla.suse.com/839870" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4788" ref_url="https://www.suse.com/security/cve/CVE-2013-4788/" source="CVE"/>
		<description>

This update for glibc contains the following fixes:

    * Fix integer overflows in malloc (CVE-2013-4332, bnc#839870)
    * Fix buffer overflow in glob (bnc#691365)
    * Fix buffer overflow in strcoll (CVE-2012-4412, bnc#779320)
    * Update mount flags in &lt;sys/mount.h&gt; (bnc#791928)
    * Fix buffer overrun in regexp matcher (CVE-2013-0242, bnc#801246)
    * Fix memory leaks in dlopen (bnc#811979)
    * Fix stack overflow in getaddrinfo with many results (CVE-2013-1914,
      bnc#813121)
    * Fix check for XEN build in glibc_post_upgrade that causes missing
      init re-exec (bnc#818628)
    * Don't raise UNDERFLOW in tan/tanf for small but normal argument
      (bnc#819347)
    * Properly cross page boundary in SSE4.2 implementation of strcmp
      (bnc#822210)
    * Fix robust mutex handling after fork (bnc#827811)
    * Fix missing character in IBM-943 charset (bnc#828235)
    * Fix use of alloca in gaih_inet (bnc#828637)
    * Initialize pointer guard also in static executables (CVE-2013-4788,
      bnc#830268)
    * Fix readdir_r with long file names (CVE-2013-4237, bnc#834594).

Security Issues:

    * CVE-2012-4412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412&gt;
    * CVE-2013-0242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242&gt;
    * CVE-2013-1914
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914&gt;
    * CVE-2013-4237
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237&gt;
    * CVE-2013-4332
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332&gt;
    * CVE-2013-4788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-13"/>
	<updated date="2013-09-13"/>
	<bugzilla href="https://bugzilla.suse.com/691365">SUSE bug 691365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791928">SUSE bug 791928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811979">SUSE bug 811979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818628">SUSE bug 818628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819347">SUSE bug 819347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822210">SUSE bug 822210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827811">SUSE bug 827811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828235">SUSE bug 828235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828637">SUSE bug 828637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830268">SUSE bug 830268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4788/">CVE-2013-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566000" comment="glibc-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566001" comment="glibc-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566002" comment="glibc-devel-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566003" comment="glibc-devel-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566004" comment="glibc-i18ndata-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566005" comment="glibc-locale-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566006" comment="glibc-locale-32bit-2.11.3-17.45.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566007" comment="nscd-2.11.3-17.45.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78198" version="1" class="patch">
	<metadata>
		<title>Security update for GnuTLS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="821818" ref_url="https://bugzilla.suse.com/821818" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2116" ref_url="https://www.suse.com/security/cve/CVE-2013-2116/" source="CVE"/>
		<description>

This update of GnuTLS fixes a regression introduced by the previous update 
that could have resulted in a Denial of Service (application crash).

Security Issue reference:

    * CVE-2013-2116
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2116&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-28"/>
	<updated date="2013-05-28"/>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2116/">CVE-2013-2116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566008" comment="gnutls-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566009" comment="libgnutls26-2.4.1-24.39.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566010" comment="libgnutls26-32bit-2.4.1-24.39.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78199" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="840510" ref_url="https://bugzilla.suse.com/840510" source="BUGZILLA"/>
		<reference ref_id="844175" ref_url="https://bugzilla.suse.com/844175" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351/" source="CVE"/>
		<reference ref_id="CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402/" source="CVE"/>
		<description>

This GnuPG update fixes two security issues:

    * CVE-2013-4351: GnuPG treated no-usage-permitted keys as
      all-usages-permitted.
    * CVE-2013-4402: An infinite recursion in the compressed packet parser
      was fixed.

Security Issue reference:

    * CVE-2013-4351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351&gt;
    * CVE-2013-4402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/840510">SUSE bug 840510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844175">SUSE bug 844175</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566011" comment="gpg2-2.0.9-25.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566012" comment="gpg2-lang-2.0.9-25.33.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78200" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="702028" ref_url="https://bugzilla.suse.com/702028" source="BUGZILLA"/>
		<reference ref_id="762735" ref_url="https://bugzilla.suse.com/762735" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485/" source="CVE"/>
		<reference ref_id="CVE-2012-2370" ref_url="https://www.suse.com/security/cve/CVE-2012-2370/" source="CVE"/>
		<description>

The following issue has been fixed:

    * Specially crafted GIF and XBM files could have crashed gtk2
      (CVE-2012-2370,CVE-2011-2485)

Security Issue references:

    * CVE-2012-2370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370&gt;
    * CVE-2011-2485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-06-05"/>
	<updated date="2012-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762735">SUSE bug 762735</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2370/">CVE-2012-2370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566013" comment="gtk2-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566014" comment="gtk2-32bit-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566015" comment="gtk2-devel-2.18.9-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566016" comment="gtk2-lang-2.18.9-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78201" version="1" class="patch">
	<metadata>
		<title>Security update for hplip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="808355" ref_url="https://bugzilla.suse.com/808355" source="BUGZILLA"/>
		<reference ref_id="835827" ref_url="https://bugzilla.suse.com/835827" source="BUGZILLA"/>
		<reference ref_id="836937" ref_url="https://bugzilla.suse.com/836937" source="BUGZILLA"/>
		<reference ref_id="852368" ref_url="https://bugzilla.suse.com/852368" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>

hplip was updated to fix three security issues:

    * 

      CVE-2013-0200: Some local file overwrite problems via predictable
      /tmp filenames were fixed.

    * 

      CVE-2013-4325: hplip used an insecure polkit DBUS API (polkit-process
      subject race condition) which could lead to local privilege
      escalation.

    * 

      CVE-2013-6402: hplip uses arbitrary file creation/overwrite (via
      hardcoded file name /tmp/hp-pkservice.log)

Security Issue references:

    * CVE-2013-4325
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325&gt;
    * CVE-2013-0200
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200&gt;
    * CVE-2013-6402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-17"/>
	<updated date="2014-01-17"/>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566017" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566018" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78202" version="1" class="patch">
	<metadata>
		<title>Security update for icedtea-web</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="840572" ref_url="https://bugzilla.suse.com/840572" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4540" ref_url="https://www.suse.com/security/cve/CVE-2012-4540/" source="CVE"/>
		<reference ref_id="CVE-2013-4349" ref_url="https://www.suse.com/security/cve/CVE-2013-4349/" source="CVE"/>
		<description>

This icedtea-web update adds a missing fix for an off-by-one heap-based 
buffer overflow.

bnc#840572: CVE-2013-4349: icedtea-web 1.4.1 fixes the missing patch for 
CVE-2012-4540.

Security Issues:

    * CVE-2012-4540
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540&gt;
    * CVE-2013-4349
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4349&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-24"/>
	<updated date="2013-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/840572">SUSE bug 840572</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4540/">CVE-2012-4540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4349/">CVE-2013-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566019" comment="icedtea-web-1.4.1-0.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78203" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="657910" ref_url="https://bugzilla.suse.com/657910" source="BUGZILLA"/>
		<reference ref_id="736146" ref_url="https://bugzilla.suse.com/736146" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-4599" ref_url="https://www.suse.com/security/cve/CVE-2011-4599/" source="CVE"/>
		<description>

This update is rereleased because some architectures were missed on the 
first try. It fixes the following security issues:

    * Specially crafted strings could cause a buffer overflow in icu (
      CVE-2011-4599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4599&gt; )
    * An integer overflow in the getSymbol() function could crash
      applications using icu (CVE-2010-4409
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4409&gt; )

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-19"/>
	<updated date="2012-12-19"/>
	<bugzilla href="https://bugzilla.suse.com/657910">SUSE bug 657910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736146">SUSE bug 736146</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4599/">CVE-2011-4599</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009562934" comment="icu-4.0-7.26.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566020" comment="libicu-4.0-7.26.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78204" version="1" class="patch">
	<metadata>
		<title>Security update for inkscape</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="794958" ref_url="https://bugzilla.suse.com/794958" source="BUGZILLA"/>
		<reference ref_id="796306" ref_url="https://bugzilla.suse.com/796306" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5656" ref_url="https://www.suse.com/security/cve/CVE-2012-5656/" source="CVE"/>
		<reference ref_id="CVE-2012-6076" ref_url="https://www.suse.com/security/cve/CVE-2012-6076/" source="CVE"/>
		<description>

inkscape was updated to fix a XXE (Xml eXternal Entity) attack during 
rasterization of SVG images (CVE-2012-5656), where the rendering of 
malicious SVG images could have connected from inkscape to internal hosts.

Also inkscape would have loaded .EPS files from untrusted /tmp occasionaly 
instead from the current directory. (CVE-2012-6076)

Security Issue references:

    * CVE-2012-6076
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6076&gt;
    * CVE-2012-5656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5656&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-20"/>
	<updated date="2013-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/794958">SUSE bug 794958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796306">SUSE bug 796306</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5656/">CVE-2012-5656</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6076/">CVE-2012-6076</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566021" comment="inkscape-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566022" comment="inkscape-extensions-dia-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566023" comment="inkscape-extensions-extra-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566024" comment="inkscape-extensions-fig-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566025" comment="inkscape-extensions-gimp-0.46-62.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566026" comment="inkscape-lang-0.46-62.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78205" version="1" class="patch">
	<metadata>
		<title>Security update for OpenJDK 1.6</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="852367" ref_url="https://bugzilla.suse.com/852367" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829/" source="CVE"/>
		<reference ref_id="CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002/" source="CVE"/>
		<reference ref_id="CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772/" source="CVE"/>
		<reference ref_id="CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774/" source="CVE"/>
		<reference ref_id="CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778/" source="CVE"/>
		<reference ref_id="CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780/" source="CVE"/>
		<reference ref_id="CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782/" source="CVE"/>
		<reference ref_id="CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783/" source="CVE"/>
		<reference ref_id="CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784/" source="CVE"/>
		<reference ref_id="CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790/" source="CVE"/>
		<reference ref_id="CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797/" source="CVE"/>
		<reference ref_id="CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802/" source="CVE"/>
		<reference ref_id="CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803/" source="CVE"/>
		<reference ref_id="CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804/" source="CVE"/>
		<reference ref_id="CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809/" source="CVE"/>
		<reference ref_id="CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814/" source="CVE"/>
		<reference ref_id="CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817/" source="CVE"/>
		<reference ref_id="CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820/" source="CVE"/>
		<reference ref_id="CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823/" source="CVE"/>
		<reference ref_id="CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825/" source="CVE"/>
		<reference ref_id="CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829/" source="CVE"/>
		<reference ref_id="CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830/" source="CVE"/>
		<reference ref_id="CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840/" source="CVE"/>
		<reference ref_id="CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842/" source="CVE"/>
		<reference ref_id="CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849/" source="CVE"/>
		<reference ref_id="CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850/" source="CVE"/>
		<reference ref_id="CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851/" source="CVE"/>
		<description>

OpenJDK 1.6 was updated to the new Icedtea release 1.12.7, which includes 
many fixes for bugs and security issues:

    * S8006900, CVE-2013-3829: Add new date/time capability
    * S8008589: Better MBean permission validation
    * S8011071, CVE-2013-5780: Better crypto provider handling
    * S8011081, CVE-2013-5772: Improve jhat
    * S8011157, CVE-2013-5814: Improve CORBA portablility
    * S8012071, CVE-2013-5790: Better Building of Beans
    * S8012147: Improve tool support
    * S8012277: CVE-2013-5849: Improve AWT DataFlavor
    * S8012425, CVE-2013-5802: Transform TransformerFactory
    * S8013503, CVE-2013-5851: Improve stream factories
    * S8013506: Better Pack200 data handling
    * S8013510, CVE-2013-5809: Augment image writing code
    * S8013514: Improve stability of cmap class
    * S8013739, CVE-2013-5817: Better LDAP resource management
    * S8013744, CVE-2013-5783: Better tabling for AWT
    * S8014085: Better serialization support in JMX classes
    * S8014093, CVE-2013-5782: Improve parsing of images
    * S8014102, CVE-2013-5778: Improve image conversion
    * S8014341, CVE-2013-5803: Better service from Kerberos servers
    * S8014349, CVE-2013-5840: (cl) Class.getDeclaredClass problematic in
      some class loader configurations
    * S8014530, CVE-2013-5825: Better digital signature processing
    * S8014534: Better profiling support
    * S8014987, CVE-2013-5842: Augment serialization handling
    * S8015614: Update build settings
    * S8015731: Subject java.security.auth.subject to improvements
    * S8015743, CVE-2013-5774: Address internet addresses
    * S8016256: Make finalization final
    * S8016653, CVE-2013-5804: javadoc should ignore ignoreable characters
      in names
    * S8016675, CVE-2013-5797: Make Javadoc pages more robust
    * S8017196, CVE-2013-5850: Ensure Proxies are handled appropriately
    * S8017287, CVE-2013-5829: Better resource disposal
    * S8017291, CVE-2013-5830: Cast Proxies Aside
    * S8017298, CVE-2013-4002: Better XML support
    * S8017300, CVE-2013-5784: Improve Interface Implementation
    * S8017505, CVE-2013-5820: Better Client Service
    * S8019292: Better Attribute Value Exceptions
    * S8019617: Better view of objects
    * S8020293: JVM crash
    * S8021290, CVE-2013-5823: Better signature validation
    * S8022940: Enhance CORBA translations
    * S8023683: Enhance class file parsing

Security issue references:

    * CVE-2013-3829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829&gt;
    * CVE-2013-5780
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780&gt;
    * CVE-2013-5772
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772&gt;
    * CVE-2013-5814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814&gt;
    * CVE-2013-5790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790&gt;
    * CVE-2013-5849
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849&gt;
    * CVE-2013-5802
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802&gt;
    * CVE-2013-5851
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851&gt;
    * CVE-2013-5809
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809&gt;
    * CVE-2013-5817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817&gt;
    * CVE-2013-5783
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783&gt;
    * CVE-2013-5782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782&gt;
    * CVE-2013-5778
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778&gt;
    * CVE-2013-5803
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803&gt;
    * CVE-2013-5840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840&gt;
    * CVE-2013-5825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825&gt;
    * CVE-2013-5842
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842&gt;
    * CVE-2013-5774
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774&gt;
    * CVE-2013-5804
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804&gt;
    * CVE-2013-5797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797&gt;
    * CVE-2013-5850
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850&gt;
    * CVE-2013-5829
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829&gt;
    * CVE-2013-5830
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830&gt;
    * CVE-2013-4002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002&gt;
    * CVE-2013-5784
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784&gt;
    * CVE-2013-5820
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820&gt;
    * CVE-2013-5823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-29"/>
	<updated date="2013-11-29"/>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566027" comment="java-1_6_0-openjdk-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566028" comment="java-1_6_0-openjdk-demo-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566029" comment="java-1_6_0-openjdk-devel-1.6.0.0_b27.1.12.7-0.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78206" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="787520" ref_url="https://bugzilla.suse.com/787520" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4512" ref_url="https://www.suse.com/security/cve/CVE-2012-4512/" source="CVE"/>
		<reference ref_id="CVE-2012-4513" ref_url="https://www.suse.com/security/cve/CVE-2012-4513/" source="CVE"/>
		<reference ref_id="CVE-2012-4515" ref_url="https://www.suse.com/security/cve/CVE-2012-4515/" source="CVE"/>
		<description>

This kdelibs4 update fixes several security issues related to 
khtml/konqueror.

    * Fix security issues and null pointer references in khtml/konqueror
      (bnc#787520) (CVE-2012-4512, CVE-2012-4513, CVE-2012-4515)

Security Issue references:

    * CVE-2012-4512
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4512&gt;
    * CVE-2012-4513
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4513&gt;
    * CVE-2012-4515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-01"/>
	<updated date="2013-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/787520">SUSE bug 787520</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4512/">CVE-2012-4512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4513/">CVE-2012-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4515/">CVE-2012-4515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566030" comment="kdelibs4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566031" comment="kdelibs4-core-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566032" comment="libkde4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562953" comment="libkde4-32bit-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566033" comment="libkdecore4-4.3.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009562955" comment="libkdecore4-32bit-4.3.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78207" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="858831" ref_url="https://bugzilla.suse.com/858831" source="BUGZILLA"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 2 kernel was updated to fix a 
regression introduced by the previous update:

    * scsi_dh_alua: Incorrect reference counting in the SCSI ALUA
      initialization code lead to system crashes on boot (bnc#858831).

As the update introducing the regression was marked security, this is also 
marked security even though this bug is not security relevant.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-05"/>
	<updated date="2014-02-05"/>
	<bugzilla href="https://bugzilla.suse.com/858831">SUSE bug 858831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566034" comment="kernel-default-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566035" comment="kernel-default-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566036" comment="kernel-default-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566037" comment="kernel-default-extra-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566038" comment="kernel-pae-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566039" comment="kernel-pae-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566040" comment="kernel-pae-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566041" comment="kernel-pae-extra-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566042" comment="kernel-source-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566043" comment="kernel-syms-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566044" comment="kernel-trace-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566045" comment="kernel-trace-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566046" comment="kernel-trace-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566047" comment="kernel-trace-extra-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566048" comment="kernel-xen-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566049" comment="kernel-xen-base-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566050" comment="kernel-xen-devel-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566051" comment="kernel-xen-extra-3.0.101-0.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566052" comment="xen-kmp-default-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566053" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566054" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.7.17-0.5.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78208" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="849240" ref_url="https://bugzilla.suse.com/849240" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418/" source="CVE"/>
		<description>

This update for krb5 fixes the following security issue:

    * If a KDC serves multiple realms, certain requests could cause
      setup_server_realm() to dereference a null pointer, crashing the KDC.
      (CVE-2013-1418)

Security Issues:

    * CVE-2013-1418
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-08"/>
	<updated date="2013-11-08"/>
	<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566055" comment="krb5-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566056" comment="krb5-32bit-1.6.3-133.49.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566057" comment="krb5-client-1.6.3-133.49.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78209" version="1" class="patch">
	<metadata>
		<title>Security update for KVM</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="712137" ref_url="https://bugzilla.suse.com/712137" source="BUGZILLA"/>
		<reference ref_id="725008" ref_url="https://bugzilla.suse.com/725008" source="BUGZILLA"/>
		<reference ref_id="786813" ref_url="https://bugzilla.suse.com/786813" source="BUGZILLA"/>
		<reference ref_id="818182" ref_url="https://bugzilla.suse.com/818182" source="BUGZILLA"/>
		<reference ref_id="824340" ref_url="https://bugzilla.suse.com/824340" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<description>

This update fixes a file permission issue with qga (the QEMU Guest Agent) 
from the qemu/kvm package and includes several bug-fixes.

(bnc#818182) (CVE-2013-2007) (bnc#786813) (bnc#725008) (bnc#712137) 
(bnc#824340)

Security Issues:

    * CVE-2013-2007
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-24"/>
	<updated date="2013-06-24"/>
	<bugzilla href="https://bugzilla.suse.com/712137">SUSE bug 712137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725008">SUSE bug 725008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786813">SUSE bug 786813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818182">SUSE bug 818182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824340">SUSE bug 824340</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566058" comment="kvm-0.15.1-0.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78210" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

    * CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS
      allowed remote attackers to cause a denial of service (crash) via a
      crafted (1) ICC color profile to the icctrans utility or (2) TIFF
      image to the tiffdiff utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566059" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566060" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566061" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78211" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="757576" ref_url="https://bugzilla.suse.com/757576" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111/" source="CVE"/>
		<description>

This update of Samba fixes one security issue and several bugs.

The security fix is:

    * Ensure that users cannot hand out their own privileges to everyone,
      only administrators are allowed to do that. (CVE-2012-2111
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111&gt; )

The non-security bug fixes merged from upstream Samba are:

    * Fix default name resolve order. (docs-xml, bso#7564).
    * Fix a segfault in vfs_aio_fork. (s3-aio-fork, bso#8836).
    * Remove whitespace in example samba.ldif. (docs, bso#8789)
    * Move print_backend_init() behind init_system_info(). (s3-smbd,
      bso#8845)
    * Prepend '/' to filename argument. (s3-docs, bso#8826)

		</description>
<advisory from="security@suse.de">
	<issued date="2012-04-24"/>
	<updated date="2012-04-24"/>
	<bugzilla href="https://bugzilla.suse.com/757576">SUSE bug 757576</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566062" comment="libldb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566063" comment="libldb1-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566064" comment="libsmbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566065" comment="libsmbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566066" comment="libtalloc2-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566067" comment="libtalloc2-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566068" comment="libtdb1-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566069" comment="libtdb1-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566070" comment="libtevent0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566071" comment="libtevent0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566072" comment="libwbclient0-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566073" comment="libwbclient0-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566074" comment="samba-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566075" comment="samba-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566076" comment="samba-client-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566077" comment="samba-client-32bit-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566078" comment="samba-doc-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566079" comment="samba-krb-printing-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566080" comment="samba-winbind-3.6.3-0.24.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566081" comment="samba-winbind-32bit-3.6.3-0.24.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78212" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="784197" ref_url="https://bugzilla.suse.com/784197" source="BUGZILLA"/>
		<reference ref_id="797006" ref_url="https://bugzilla.suse.com/797006" source="BUGZILLA"/>
		<reference ref_id="802634" ref_url="https://bugzilla.suse.com/802634" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254/" source="CVE"/>
		<description>

libqt4 has been updated to fix several security issues.

    * An information disclosure via QSharedMemory was fixed which allowed
      local attackers to read information (e.g. bitmap content) from the
      attacked user (CVE-2013-0254).
    * openssl-incompatibility-fix.diff: Fix wrong error reporting when
      using a binary incompatible version of openSSL (bnc#797006,
      CVE-2012-6093)
    * Various compromised SSL root certificates were blacklisted.

Also a non-security bugfix has been applied:

    * Add fix for qdbusviewer not matching args (bnc#784197)

Security Issue reference:

    * CVE-2013-0254
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-01"/>
	<updated date="2013-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/784197">SUSE bug 784197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797006">SUSE bug 797006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566082" comment="libQtWebKit4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566083" comment="libQtWebKit4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566084" comment="libqt4-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566085" comment="libqt4-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566086" comment="libqt4-qt3support-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566087" comment="libqt4-qt3support-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566088" comment="libqt4-sql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566089" comment="libqt4-sql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566090" comment="libqt4-sql-mysql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566091" comment="libqt4-sql-mysql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566092" comment="libqt4-sql-postgresql-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566093" comment="libqt4-sql-postgresql-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566094" comment="libqt4-sql-sqlite-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566095" comment="libqt4-sql-sqlite-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566096" comment="libqt4-sql-unixODBC-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566097" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566098" comment="libqt4-x11-4.6.3-5.20.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566099" comment="libqt4-x11-32bit-4.6.3-5.20.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78213" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="812525" ref_url="https://bugzilla.suse.com/812525" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899/" source="CVE"/>
		<reference ref_id="CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900/" source="CVE"/>
		<reference ref_id="CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901/" source="CVE"/>
		<description>

This update to version 9.1.9 fixes:

    * CVE-2013-1899: Fix insecure parsing of server command-line switches.
    * CVE-2013-1900: Reset OpenSSL randomness state in each postmaster
      child process.
    * CVE-2013-1901: Make REPLICATION privilege checks test current user
      not authenticated user.

Security Issue references:

    * CVE-2013-1899
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899&gt;
    * CVE-2013-1900
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900&gt;
    * CVE-2013-1901
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-02"/>
	<updated date="2013-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566100" comment="libecpg6-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566101" comment="libpq5-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566102" comment="libpq5-32bit-9.1.9-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566103" comment="postgresql91-9.1.9-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78214" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

This update of libgcrypt mitigates the Yarom/Falkner flush+reload 
side-channel attack on RSA secret keys (CVE-2013-4242).

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566104" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566105" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78215" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="792444" ref_url="https://bugzilla.suse.com/792444" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611/" source="CVE"/>
		<reference ref_id="CVE-2012-5612" ref_url="https://www.suse.com/security/cve/CVE-2012-5612/" source="CVE"/>
		<reference ref_id="CVE-2012-5613" ref_url="https://www.suse.com/security/cve/CVE-2012-5613/" source="CVE"/>
		<reference ref_id="CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615/" source="CVE"/>
		<description>

A stack-based buffer overflow in MySQL has been fixed that could have 
caused a Denial of Service or potentially allowed the execution of 
arbitrary code (CVE-2012-5611).

Security Issue references:

    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615&gt;
    * CVE-2012-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5613&gt;
    * CVE-2012-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612&gt;
    * CVE-2012-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-12-27"/>
	<updated date="2012-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/792444">SUSE bug 792444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5612/">CVE-2012-5612</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5613/">CVE-2012-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566106" comment="libmysqlclient15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566107" comment="libmysqlclient15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566108" comment="libmysqlclient_r15-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566109" comment="libmysqlclient_r15-32bit-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566110" comment="mysql-5.0.96-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566111" comment="mysql-client-5.0.96-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78216" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="779952" ref_url="https://bugzilla.suse.com/779952" source="BUGZILLA"/>
		<reference ref_id="802648" ref_url="https://bugzilla.suse.com/802648" source="BUGZILLA"/>
		<reference ref_id="802746" ref_url="https://bugzilla.suse.com/802746" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166/" source="CVE"/>
		<reference ref_id="CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169/" source="CVE"/>
		<description>

OpenSSL has been updated to fix several security issues:

    * CVE-2012-4929: Avoid the openssl CRIME attack by disabling SSL
      compression by default. Setting the environment variable
      'OPENSSL_NO_DEFAULT_ZLIB' to 'no' enables compression again.
    * CVE-2013-0169: Timing attacks against TLS could be used by physically
      local attackers to gain access to transmitted plain text or private
      keymaterial. This issue is also known as the 'Lucky-13' issue.
    * CVE-2013-0166: A OCSP invalid key denial of service issue was fixed.

Security Issue references:

    * CVE-2013-0169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169&gt;
    * CVE-2013-0166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-25"/>
	<updated date="2013-03-25"/>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566112" comment="libopenssl0_9_8-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566113" comment="libopenssl0_9_8-32bit-0.9.8j-0.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566114" comment="openssl-0.9.8j-0.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78217" version="1" class="patch">
	<metadata>
		<title>Security update for libotr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="777468" ref_url="https://bugzilla.suse.com/777468" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3461" ref_url="https://www.suse.com/security/cve/CVE-2012-3461/" source="CVE"/>
		<description>

This update fixes various heap overflows in libotr. CVE-2012-3461 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2012-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-21"/>
	<updated date="2012-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/777468">SUSE bug 777468</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3461/">CVE-2012-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566115" comment="libotr2-3.2.0-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78218" version="1" class="patch">
	<metadata>
		<title>Security update for pcp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="732763" ref_url="https://bugzilla.suse.com/732763" source="BUGZILLA"/>
		<reference ref_id="775009" ref_url="https://bugzilla.suse.com/775009" source="BUGZILLA"/>
		<reference ref_id="775010" ref_url="https://bugzilla.suse.com/775010" source="BUGZILLA"/>
		<reference ref_id="775011" ref_url="https://bugzilla.suse.com/775011" source="BUGZILLA"/>
		<reference ref_id="775013" ref_url="https://bugzilla.suse.com/775013" source="BUGZILLA"/>
		<reference ref_id="782967" ref_url="https://bugzilla.suse.com/782967" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3418" ref_url="https://www.suse.com/security/cve/CVE-2012-3418/" source="CVE"/>
		<reference ref_id="CVE-2012-3419" ref_url="https://www.suse.com/security/cve/CVE-2012-3419/" source="CVE"/>
		<reference ref_id="CVE-2012-3420" ref_url="https://www.suse.com/security/cve/CVE-2012-3420/" source="CVE"/>
		<reference ref_id="CVE-2012-3421" ref_url="https://www.suse.com/security/cve/CVE-2012-3421/" source="CVE"/>
		<description>

pcp was updated to version 3.6.10 which fixes security issues and also 
brings a lot of new features.

    * 

      Update to pcp-3.6.10.

          o Transition daemons to run under an unprivileged account.
          o Fixes for security advisory CVE-2012-5530: tmpfile flaws;
            (bnc#782967).
          o Fix pcp(1) command short-form pmlogger reporting.
          o Fix pmdalogger error handling for directory files.
          o Fix pmstat handling of odd corner case in CPU metrics.
          o Correct the python ctype used for pmAtomValue 32bit ints.
          o Add missing RPM spec dependency for python-ctypes.
          o Corrections to pmdamysql metrics units.
          o Add pmdamysql slave status metrics.
          o Improve pmcollectl error messages.
          o Parameterize pmcollectl CPU counts in interrupt subsys.
          o Fix generic RPM packaging for powerpc builds.
          o Fix python API use of reentrant libpcp string routines.
          o Python code backporting for RHEL5 in qa and pmcollectl.
          o Fix edge cases in capturing interrupt error counts.
    * 

      Update to pcp-3.6.9.

          o Python wrapper for the pmimport API
          o Make sar2pcp work with the sysstat versions from RHEL5, RHEL6,
            and all recent Fedora versions (which is almost all current
            versions of sysstat verified).
          o Added a number of additional metrics into the importer for
            people starting to use it to analyse sar data from real
            customer incidents.
          o Rework use of C99 'restrict' keyword in pmdalogger (Debian bug:
            689552)
          o Alot of work on the PCP QA suite, special thanks to Tomas
            Dohnalek for all his efforts there.
          o Win32 build updates
          o Add 'raw' disk active metrics so that existing tools like
            iostat can be emulated
          o Allow sar2pcp to accept XML input directly (.xml suffix),
            allowing it to not have to run on the same platform as the
            sadc/sadf that originally generated it.
          o Add PMI error codes into the PCP::LogImport perl module.
          o Fix a typo in pmiUnits man page synopsis section
          o Resolve pmdalinux ordering issue in NUMA/CPU indom setup
            (Redhat bug: 858384)
          o Remove unused pmcollectl imports (Redhat bug: 863210)
          o Allow event traces to be used in libpcp interpolate mode
    * 

      Update to pcp-3.6.8.

          o Corrects the disk/partition identification for the MMC driver,
            which makes disk indom handling correct on the Raspberry Pi
            (http://www.raspberrypi.org/)
          o Several minor/basic fixes for pmdaoracle.
          o Improve pmcollectl compatibility.
          o Make a few clarifications to pmcollectl.1.
          o Improve python API test coverage.
          o Numerous updates to the test suite in general.
          o Allow pmda Install scripts to specify own dso name again.
          o Reconcile spec file differences between PCP flavours.
          o Fix handling of multiple contexts with a remote namespace.
          o Core socket interface abstractions to support NSS (later).
          o Fix man page SYNOPSIS section for pmUnpackEventRecords.
          o Add --disable-shared build option for static builds.
    * 

      Update to pcp-3.6.6.

          o Added the python PMAPI bindings and an initial python client in
            pmcollectl. Separate, new package exists for python libs for
            those platforms that split out packages (rpm, deb).
          o Added a pcp-testsuite package for those platforms that might
            want this (rpm, deb again, mainly)
          o Re-introduced the pcp/qa subdirectory in pcp and deprecated the
            external pcpqa git tree.
          o Fix potential buffer overflow in pmlogger host name handling.
          o Reworked the configure --prefix handling to be more like the
            rest of the open source world.
          o Ensure the __pmDecodeText ident parameter is always set
            Resolves Red Hat bugzilla bug #841306.

Security Issue references:

    * CVE-2012-3418
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3418&gt;
    * CVE-2012-3419
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3419&gt;
    * CVE-2012-3420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3420&gt;
    * CVE-2012-3421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3421&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-01-07"/>
	<updated date="2013-01-07"/>
	<bugzilla href="https://bugzilla.suse.com/732763">SUSE bug 732763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775009">SUSE bug 775009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775010">SUSE bug 775010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775011">SUSE bug 775011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775013">SUSE bug 775013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782967">SUSE bug 782967</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3418/">CVE-2012-3418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3419/">CVE-2012-3419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3420/">CVE-2012-3420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3421/">CVE-2012-3421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566116" comment="permissions-2013.1.7-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78219" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566117" comment="libpixman-1-0-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566118" comment="libpixman-1-0-32bit-0.16.0-1.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566119" comment="libpixman-1-0-devel-0.16.0-1.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78220" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="806793" ref_url="https://bugzilla.suse.com/806793" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<description>

This update of poppler fixes the following vulnerabilities:

    * CVE-2013-1788: Various invalid memory issues could be used by
      attackers supplying PDFs to crash the PDF viewer or potentially
      execute code.
    * CVE-2013-1789: A crash in poppler could be used by attackers
      providing PDFs to crash the PDF viewer.
    * CVE-2013-1790: An uninitialized memory read could be used by
      attackers providing PDFs to crash the PDF viewer.

Security Issue references:

    * CVE-2013-1788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788&gt;
    * CVE-2013-1789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789&gt;
    * CVE-2013-1790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-26"/>
	<updated date="2013-03-26"/>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566120" comment="libpoppler-glib4-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566121" comment="libpoppler-qt4-3-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566122" comment="libpoppler5-0.12.3-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563015" comment="poppler-tools-0.12.3-1.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78221" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="761626" ref_url="https://bugzilla.suse.com/761626" source="BUGZILLA"/>
		<reference ref_id="784523" ref_url="https://bugzilla.suse.com/784523" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4505" ref_url="https://www.suse.com/security/cve/CVE-2012-4505/" source="CVE"/>
		<description>

This update for libproxy fixes a heap-based buffer overflow that could have 
allowed remote servers to have an unspecified impact via a crafted 
Content-Length size in an HTTP response header for a proxy.pac file request 
(CVE-2012-4505).

Additionally, it fixes parsing of the $no_proxy environment variable when 
it contains more than one URL separated by white-spaces.

Security Issue reference:

    * CVE-2012-4505
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4505&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-23"/>
	<updated date="2012-11-23"/>
	<bugzilla href="https://bugzilla.suse.com/761626">SUSE bug 761626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4505/">CVE-2012-4505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566123" comment="libproxy0-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566124" comment="libproxy0-32bit-0.3.1-2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566125" comment="libproxy0-config-gnome-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566126" comment="libproxy0-config-gnome-32bit-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566127" comment="libproxy0-config-kde4-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566128" comment="libproxy0-networkmanager-0.3.1-2.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566129" comment="libproxy0-networkmanager-32bit-0.3.1-2.6.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78222" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="719988" ref_url="https://bugzilla.suse.com/719988" source="BUGZILLA"/>
		<reference ref_id="734733" ref_url="https://bugzilla.suse.com/734733" source="BUGZILLA"/>
		<reference ref_id="741480" ref_url="https://bugzilla.suse.com/741480" source="BUGZILLA"/>
		<reference ref_id="744510" ref_url="https://bugzilla.suse.com/744510" source="BUGZILLA"/>
		<reference ref_id="757602" ref_url="https://bugzilla.suse.com/757602" source="BUGZILLA"/>
		<reference ref_id="758565" ref_url="https://bugzilla.suse.com/758565" source="BUGZILLA"/>
		<reference ref_id="759172" ref_url="https://bugzilla.suse.com/759172" source="BUGZILLA"/>
		<reference ref_id="759180" ref_url="https://bugzilla.suse.com/759180" source="BUGZILLA"/>
		<reference ref_id="760019" ref_url="https://bugzilla.suse.com/760019" source="BUGZILLA"/>
		<reference ref_id="760997" ref_url="https://bugzilla.suse.com/760997" source="BUGZILLA"/>
		<reference ref_id="768027" ref_url="https://bugzilla.suse.com/768027" source="BUGZILLA"/>
		<reference ref_id="770708" ref_url="https://bugzilla.suse.com/770708" source="BUGZILLA"/>
		<reference ref_id="772094" ref_url="https://bugzilla.suse.com/772094" source="BUGZILLA"/>
		<reference ref_id="773048" ref_url="https://bugzilla.suse.com/773048" source="BUGZILLA"/>
		<reference ref_id="773061" ref_url="https://bugzilla.suse.com/773061" source="BUGZILLA"/>
		<reference ref_id="773515" ref_url="https://bugzilla.suse.com/773515" source="BUGZILLA"/>
		<reference ref_id="774167" ref_url="https://bugzilla.suse.com/774167" source="BUGZILLA"/>
		<reference ref_id="774681" ref_url="https://bugzilla.suse.com/774681" source="BUGZILLA"/>
		<reference ref_id="774921" ref_url="https://bugzilla.suse.com/774921" source="BUGZILLA"/>
		<reference ref_id="775899" ref_url="https://bugzilla.suse.com/775899" source="BUGZILLA"/>
		<reference ref_id="775906" ref_url="https://bugzilla.suse.com/775906" source="BUGZILLA"/>
		<reference ref_id="777181" ref_url="https://bugzilla.suse.com/777181" source="BUGZILLA"/>
		<reference ref_id="778669" ref_url="https://bugzilla.suse.com/778669" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4233" ref_url="https://www.suse.com/security/cve/CVE-2012-4233/" source="CVE"/>
		<description>

LibreOffice was updated to SUSE 3.5 bugfix release 13 (based on upstream 
3.5.6-rc2) which fixes a lot of bugs.

The following bugs have been fixed:

    * polygon fill rule (bnc#759172)
    * open XML in Writer (bnc#777181)
    * undo in text objects (fdo#36138)
    * broken numbering level (bnc#760019)
    * better MathML detection (bnc#774921)
    * pictures in DOCX import (bnc#772094)
    * collapsing border painting (fdo#39415)
    * better DOCX text box export (fdo#45724)
    * hidden text in PPTX import (bnc#759180)
    * slide notes in PPTX import (bnc#768027)
    * RTL paragraphs in DOC import (fdo#43398)
    * better vertical text imports (bnc#744510)
    * HYPERLINK field in DOCX import (fdo#51034)
    * shadow color on partial redraw (bnc#773515)
    * floating objects in DOCX import (bnc#775899)
    * graphite2 hyphenation regression (fdo#49486)
    * missing shape position and size (bnc#760997)
    * page style attributes in ODF import (fdo#38056)
    * browsing in Template dialog crasher (fdo#46249)
    * wrong master slide shape being used (bnc#758565)
    * page borders regression in ODT import (fdo#38056)
    * invalidate bound rect after drag&amp;drop (fdo#44534)
    * rotated shape margins in PPTX import (bnc#773048)
    * pasting into more than 1 sheet crasher (fdo#47311)
    * crashers in PPT/PPTX import (bnc#768027, bnc#774167
    * missing footnote in DOCX/DOC/RTF export (fdo#46020)
    * checkbox no-label behaviour (fdo#51336, bnc#757602)
    * try somewhat harder to read w:position (bnc#773061)
    * FormatNumber can handle sal_uInt32 values (fdo#51793)
    * rectangle-paragraph tables in DOCX import (bnc#775899)
    * header and bullet in slideshow transition (bnc#759172)
    * default background color in DOC/DOCX export (fdo#45724)
    * font name / size attributes in DOCX import (bnc#774681)
    * zero rect. size causing wrong line positions (fdo#47434)
    * adjusted display of Bracket/BracePair in PPT (bnc#741480)
    * use Unicode functions for QuickStarter tooltip (fdo#52143)
    * TabRatio API and detect macro at group shape fixes (bnc#770708)
    * indented text in DOCX file does not wrap correctly (bnc#775906)
    * undocked toolbars do not show all icons in special ratio (fdo#47071)
    * cross-reference text when Caption order is Numbering first
      (fdo#50801)
    * bullet color same as following text by default (bnc#719988,
      bnc#734733)
    * misc RTF import fixes (rhbz#819304, fdo#49666, bnc#774681, fdo#51772,
      fdo#48033, fdo#52066, fdo#48335, fdo#48446, fdo#49892, fdo#46966)
    * libvisio was updated to 0.0.19:
    * file displays as blank page in Draw (fdo#50990)
    * Use the vendor SUSE instead of Novell, Inc.
    * Some NULL pointer dereferences were fixed. (CVE-2012-4233)

Security Issue reference:

    * CVE-2012-4233
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4233&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-09-10"/>
	<updated date="2012-09-10"/>
	<bugzilla href="https://bugzilla.suse.com/719988">SUSE bug 719988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734733">SUSE bug 734733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741480">SUSE bug 741480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/744510">SUSE bug 744510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757602">SUSE bug 757602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758565">SUSE bug 758565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759172">SUSE bug 759172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759180">SUSE bug 759180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760019">SUSE bug 760019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760997">SUSE bug 760997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/768027">SUSE bug 768027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770708">SUSE bug 770708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/772094">SUSE bug 772094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773048">SUSE bug 773048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773061">SUSE bug 773061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773515">SUSE bug 773515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774167">SUSE bug 774167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774681">SUSE bug 774681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/774921">SUSE bug 774921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775899">SUSE bug 775899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/775906">SUSE bug 775906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777181">SUSE bug 777181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778669">SUSE bug 778669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4233/">CVE-2012-4233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563017" comment="libreoffice-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563018" comment="libreoffice-base-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563019" comment="libreoffice-base-drivers-postgresql-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563020" comment="libreoffice-base-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563022" comment="libreoffice-calc-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563023" comment="libreoffice-calc-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563024" comment="libreoffice-draw-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563025" comment="libreoffice-draw-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563026" comment="libreoffice-filters-optional-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563027" comment="libreoffice-gnome-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563028" comment="libreoffice-help-cs-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563029" comment="libreoffice-help-da-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563030" comment="libreoffice-help-de-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563031" comment="libreoffice-help-en-GB-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563032" comment="libreoffice-help-en-US-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563033" comment="libreoffice-help-es-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563034" comment="libreoffice-help-fr-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563035" comment="libreoffice-help-gu-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563036" comment="libreoffice-help-hi-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563037" comment="libreoffice-help-hu-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563038" comment="libreoffice-help-it-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563039" comment="libreoffice-help-ja-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563040" comment="libreoffice-help-ko-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563041" comment="libreoffice-help-nl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563042" comment="libreoffice-help-pl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563043" comment="libreoffice-help-pt-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563044" comment="libreoffice-help-pt-BR-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563045" comment="libreoffice-help-ru-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563046" comment="libreoffice-help-sv-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563047" comment="libreoffice-help-zh-CN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563048" comment="libreoffice-help-zh-TW-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563049" comment="libreoffice-icon-themes-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563050" comment="libreoffice-impress-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563051" comment="libreoffice-impress-extensions-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563052" comment="libreoffice-kde-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563053" comment="libreoffice-kde4-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563054" comment="libreoffice-l10n-af-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563055" comment="libreoffice-l10n-ar-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563056" comment="libreoffice-l10n-ca-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563057" comment="libreoffice-l10n-cs-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563058" comment="libreoffice-l10n-da-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563059" comment="libreoffice-l10n-de-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563061" comment="libreoffice-l10n-en-GB-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563062" comment="libreoffice-l10n-es-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563063" comment="libreoffice-l10n-fi-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563064" comment="libreoffice-l10n-fr-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563065" comment="libreoffice-l10n-gu-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563066" comment="libreoffice-l10n-hi-IN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563067" comment="libreoffice-l10n-hu-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563068" comment="libreoffice-l10n-it-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563069" comment="libreoffice-l10n-ja-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563070" comment="libreoffice-l10n-ko-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563071" comment="libreoffice-l10n-nb-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563072" comment="libreoffice-l10n-nl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563073" comment="libreoffice-l10n-nn-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563074" comment="libreoffice-l10n-pl-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563076" comment="libreoffice-l10n-pt-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563077" comment="libreoffice-l10n-pt-BR-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563078" comment="libreoffice-l10n-ru-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563079" comment="libreoffice-l10n-sk-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563080" comment="libreoffice-l10n-sv-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563081" comment="libreoffice-l10n-xh-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563082" comment="libreoffice-l10n-zh-CN-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563083" comment="libreoffice-l10n-zh-TW-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563084" comment="libreoffice-l10n-zu-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563085" comment="libreoffice-mailmerge-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563086" comment="libreoffice-math-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563087" comment="libreoffice-mono-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563088" comment="libreoffice-officebean-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563089" comment="libreoffice-pyuno-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563091" comment="libreoffice-writer-3.5.4.13-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563092" comment="libreoffice-writer-extensions-3.5.4.13-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78223" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="789827" ref_url="https://bugzilla.suse.com/789827" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4562" ref_url="https://www.suse.com/security/cve/CVE-2012-4562/" source="CVE"/>
		<description>

This update of libssh fixes multiple integer overflows. CVE-2012-4562 has 
been assigned to this issue.

Security Issue reference:

    * CVE-2012-4562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4562&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-20"/>
	<updated date="2012-11-20"/>
	<bugzilla href="https://bugzilla.suse.com/789827">SUSE bug 789827</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4562/">CVE-2012-4562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566130" comment="libssh2-0.2-5.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78224" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566131" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566132" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78225" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="817008" ref_url="https://bugzilla.suse.com/817008" source="BUGZILLA"/>
		<reference ref_id="838638" ref_url="https://bugzilla.suse.com/838638" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296/" source="CVE"/>
		<description>

This libvirt update fixes a security issue.

    * bnc#838638: CVE-2013-4296: EMBARGOED: libvirt: Fix crash in
      remoteDispatchDomainMemoryStats
    * bnc#817008: Regression: vm-install fails to display on SLES 11 SP2
      UV2000

Security Issue reference:

    * CVE-2013-4296
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-23"/>
	<updated date="2013-09-23"/>
	<bugzilla href="https://bugzilla.suse.com/817008">SUSE bug 817008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566133" comment="libvirt-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566134" comment="libvirt-client-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566135" comment="libvirt-client-32bit-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566136" comment="libvirt-doc-0.9.6-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566137" comment="libvirt-python-0.9.6-0.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78226" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="772586" ref_url="https://bugzilla.suse.com/772586" source="BUGZILLA"/>
		<reference ref_id="773621" ref_url="https://bugzilla.suse.com/773621" source="BUGZILLA"/>
		<reference ref_id="773626" ref_url="https://bugzilla.suse.com/773626" source="BUGZILLA"/>
		<reference ref_id="780432" ref_url="https://bugzilla.suse.com/780432" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

libvirt received security and bugfixes:

    * CVE-2012-4423: Fixed a libvirt remote denial of service (crash)
      problem.

The following bugs have been fixed:

    * qemu: Fix probing for guest capabilities
    * xen-xm: Generate UUID if not specified
    * xenParseXM: don't dereference NULL pointer when script is empty

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/772586">SUSE bug 772586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773621">SUSE bug 773621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773626">SUSE bug 773626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780432">SUSE bug 780432</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566138" comment="libvirt-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566139" comment="libvirt-client-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566140" comment="libvirt-client-32bit-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566141" comment="libvirt-doc-0.9.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566142" comment="libvirt-python-0.9.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78227" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="829077" ref_url="https://bugzilla.suse.com/829077" source="BUGZILLA"/>
		<reference ref_id="854869" ref_url="https://bugzilla.suse.com/854869" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877/" source="CVE"/>
		<description>

This update fixes a DoS vulnerability in libxml2. CVE-2013-2877 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2013-2877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-06"/>
	<updated date="2014-01-06"/>
	<bugzilla href="https://bugzilla.suse.com/829077">SUSE bug 829077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854869">SUSE bug 854869</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566143" comment="libxml2-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566144" comment="libxml2-32bit-2.7.6-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566145" comment="libxml2-python-2.7.6-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78228" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566146" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566147" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78229" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependent algorithms.

    * Support for AES-GCM ciphersuites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet
      supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566148" comment="libfreebl3-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566149" comment="libfreebl3-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566150" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566151" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566152" comment="mozilla-nss-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566153" comment="mozilla-nss-32bit-3.15.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566154" comment="mozilla-nss-tools-3.15.2-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78230" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566155" comment="libfreebl3-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566156" comment="libfreebl3-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566159" comment="mozilla-nss-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566160" comment="mozilla-nss-32bit-3.15.3-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566161" comment="mozilla-nss-tools-3.15.3-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78231" version="1" class="patch">
	<metadata>
		<title>Security update for libfreebl3</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<description>

Mozilla NSS has been updated to the 3.15.3.1 security release.

The update blacklists an intermediate CA that was abused to create man in 
the middle certificates.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-13"/>
	<updated date="2013-12-13"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566162" comment="libfreebl3-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566163" comment="libfreebl3-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566164" comment="mozilla-nss-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566165" comment="mozilla-nss-32bit-3.15.3.1-0.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566166" comment="mozilla-nss-tools-3.15.3.1-0.4.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78232" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSH</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="755505" ref_url="https://bugzilla.suse.com/755505" source="BUGZILLA"/>
		<reference ref_id="802639" ref_url="https://bugzilla.suse.com/802639" source="BUGZILLA"/>
		<reference ref_id="821039" ref_url="https://bugzilla.suse.com/821039" source="BUGZILLA"/>
		<reference ref_id="826906" ref_url="https://bugzilla.suse.com/826906" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107/" source="CVE"/>
		<description>

This update for OpenSSH provides the following fixes:

    * Implement remote denial of service hardening. (bnc#802639,
      CVE-2010-5107)
    * Use only FIPS 140-2 approved algorithms when FIPS mode is detected.
      (bnc#755505, bnc#821039)
    * Do not link OpenSSH binaries with LDAP libraries. (bnc#826906)

Security Issue reference:

    * CVE-2010-5107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-16"/>
	<updated date="2013-07-16"/>
	<bugzilla href="https://bugzilla.suse.com/755505">SUSE bug 755505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802639">SUSE bug 802639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821039">SUSE bug 821039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826906">SUSE bug 826906</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566167" comment="openssh-5.1p1-41.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566168" comment="openssh-askpass-5.1p1-41.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78233" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-certs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="796628" ref_url="https://bugzilla.suse.com/796628" source="BUGZILLA"/>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<description>

openssl-certs was updated with the current certificate data available from 
mozilla.org.

Changes:

    * Updated certificates to revision 1.95
    * Distrust a sub-ca that issued google.com certificates. 'Distrusted AC
      DG Tresor SSL' (bnc#854367)

Many CA updates from Mozilla:

    * new: CA_Disig_Root_R1:2.9.0.195.3.154.238.80.144.110.40.crt server
      auth, code signing, email signing
    * new: CA_Disig_Root_R2:2.9.0.146.184.136.219.176.138.193.99.crt server
      auth, code signing, email signing
    * new:
      China_Internet_Network_Information_Center_EV_Certificates_Root:2.4.72.159.0.1.crt
      server auth
    * changed:
      Digital_Signature_Trust_Co._Global_CA_1:2.4.54.112.21.150.crt removed
      code signing and server auth abilities
    * changed:
      Digital_Signature_Trust_Co._Global_CA_3:2.4.54.110.211.206.crt
      removed code signing and server auth abilities
    * new: D-TRUST_Root_Class_3_CA_2_2009:2.3.9.131.243.crt server auth
    * new: D-TRUST_Root_Class_3_CA_2_EV_2009:2.3.9.131.244.crt server auth
    * removed:
      Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.185.102.crt
    * new: Entrust.net_Premium_2048_Secure_Server_CA:2.4.56.99.222.248.crt
    * removed: Equifax_Secure_eBusiness_CA_2:2.4.55.112.207.181.crt
    * new: PSCProcert:2.1.11.crt server auth, code signing, email signing
    * new:
      Swisscom_Root_CA_2:2.16.30.158.40.232.72.242.229.239.195.124.74.30.90.24.103.182.crt
      server auth, code signing, email signing
    * new:
      Swisscom_Root_EV_CA_2:2.17.0.242.250.100.226.116.99.211.141.253.16.29.4.31.118.202.88.crt
      server auth, code signing
    * changed:
      TC_TrustCenter_Universal_CA_III:2.14.99.37.0.1.0.2.20.141.51.21.2.228.108.244.crt
      removed all abilities
    * new: TURKTRUST_Certificate_Services_Provider_Root_2007:2.1.1.crt
      server auth, code signing
    * changed: TWCA_Root_Certification_Authority:2.1.1.crt added code
      signing ability
    * new 'EE Certification Centre Root CA'
    * new 'T-TeleSec GlobalRoot Class 3'
    * revoke mis-issued intermediate CAs from TURKTRUST.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-18"/>
	<updated date="2013-12-18"/>
	<bugzilla href="https://bugzilla.suse.com/796628">SUSE bug 796628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566169" comment="openssl-certs-1.95-0.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78234" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="843509" ref_url="https://bugzilla.suse.com/843509" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<description>

OpenVPN used a non-constant-time memcmp in HMAC comparison in 
openvpn_decrypt that might have allowed remote attackers to gain knowledge 
of plaintext data. (CVE-2013-2061)

Security Issues:

    * CVE-2013-2061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-31"/>
	<updated date="2013-10-31"/>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566170" comment="openvpn-2.0.9-143.33.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78235" version="1" class="patch">
	<metadata>
		<title>Security update for Perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="789994" ref_url="https://bugzilla.suse.com/789994" source="BUGZILLA"/>
		<reference ref_id="796014" ref_url="https://bugzilla.suse.com/796014" source="BUGZILLA"/>
		<reference ref_id="797060" ref_url="https://bugzilla.suse.com/797060" source="BUGZILLA"/>
		<reference ref_id="804415" ref_url="https://bugzilla.suse.com/804415" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667/" source="CVE"/>
		<description>

This update of Perl 5 fixes the following security issues:

    * fix rehash DoS [bnc#804415] [CVE-2013-1667]
    * improve CGI crlf escaping [bnc#789994] [CVE-2012-5526]
    * fix glob denial of service [bnc#796014] [CVE-2011-2728]
    * sanitize input in Maketext.pm [bnc#797060] [CVE-2012-6329]

Security Issue references:

    * CVE-2013-1667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-01"/>
	<updated date="2013-03-01"/>
	<bugzilla href="https://bugzilla.suse.com/789994">SUSE bug 789994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796014">SUSE bug 796014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797060">SUSE bug 797060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804415">SUSE bug 804415</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566171" comment="perl-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566172" comment="perl-32bit-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566173" comment="perl-base-5.10.0-64.61.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566174" comment="perl-doc-5.10.0-64.61.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78236" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="802679" ref_url="https://bugzilla.suse.com/802679" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255/" source="CVE"/>
		<description>

PostgreSQL has been updated to version 8.3.23 which fixes various bugs and 
one security issue.

The security issue fixed in this release, CVE-2013-0255, allowed a 
previously authenticated user to crash the server by calling an internal 
function with invalid arguments. This issue was discovered by independent 
security researcher Sumit Soni this week and reported via Secunia SVCRP, 
and we are grateful for their efforts in making PostgreSQL more secure.

More information can be found at

http://www.postgresql.org/about/news/1446/
&lt;http://www.postgresql.org/about/news/1446/&gt;

Security Issue reference:

    * CVE-2013-0255
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-02-13"/>
	<updated date="2013-02-13"/>
	<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566175" comment="postgresql-8.3.23-0.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78237" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="835122" ref_url="https://bugzilla.suse.com/835122" source="BUGZILLA"/>
		<reference ref_id="853982" ref_url="https://bugzilla.suse.com/853982" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4761" ref_url="https://www.suse.com/security/cve/CVE-2013-4761/" source="CVE"/>
		<description>

This update for puppet fixes a remote code execution vulnerability in the 
'resource_type' service. (CVE-2013-4761)

Additionally, the update prevents puppet from executing initialization 
scripts that could trigger a system reboot when handling 'puppet resource 
service' calls.

Security Issue reference:

    * CVE-2013-4761
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4761&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-20"/>
	<updated date="2014-01-20"/>
	<bugzilla href="https://bugzilla.suse.com/835122">SUSE bug 835122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853982">SUSE bug 853982</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4761/">CVE-2013-4761</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566176" comment="puppet-2.6.18-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78238" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566177" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566178" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566179" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566180" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566181" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566182" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566183" comment="python-devel-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563127" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566184" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78239" version="1" class="patch">
	<metadata>
		<title>Security update for ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="851803" ref_url="https://bugzilla.suse.com/851803" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2013-4164" ref_url="https://www.suse.com/security/cve/CVE-2013-4164/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * CVE-2013-4164: heap overflow in float point parsing

Security Issue references:

    * CVE-2013-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164&gt;
    * CVE-2009-0689
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-25"/>
	<updated date="2013-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/851803">SUSE bug 851803</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-4164/">CVE-2013-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566185" comment="ruby-1.8.7.p357-0.9.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78240" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="833278" ref_url="https://bugzilla.suse.com/833278" source="BUGZILLA"/>
		<reference ref_id="840826" ref_url="https://bugzilla.suse.com/840826" source="BUGZILLA"/>
		<reference ref_id="847506" ref_url="https://bugzilla.suse.com/847506" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018/" source="CVE"/>
		<description>

This strongswan update fixes security issues and bugs:

    * CVE-2013-5018: Specially crafted XAuth usernames and EAP identities
      can cause a crash in strongswan.
    * CVE-2013-6075: A crafted ID packet can be used by remote attackers to
      crash the server or potentially gain authentication privileges under
      certain circumstances.

Also a bug with route recursion limits was fixed:

    * Charon SEGFAULT when left=%any / recursion limit. (bnc#840826)

Security Issues:

    * CVE-2013-5018
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/833278">SUSE bug 833278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840826">SUSE bug 840826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847506">SUSE bug 847506</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566186" comment="strongswan-4.4.0-6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566187" comment="strongswan-doc-4.4.0-6.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78241" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="806919" ref_url="https://bugzilla.suse.com/806919" source="BUGZILLA"/>
		<reference ref_id="806921" ref_url="https://bugzilla.suse.com/806921" source="BUGZILLA"/>
		<reference ref_id="817349" ref_url="https://bugzilla.suse.com/817349" source="BUGZILLA"/>
		<reference ref_id="817350" ref_url="https://bugzilla.suse.com/817350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775/" source="CVE"/>
		<reference ref_id="CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776/" source="CVE"/>
		<reference ref_id="CVE-2013-2776" ref_url="https://www.suse.com/security/cve/CVE-2013-2776/" source="CVE"/>
		<reference ref_id="CVE-2013-2777" ref_url="https://www.suse.com/security/cve/CVE-2013-2777/" source="CVE"/>
		<description>

This update fixes the following security issues which allowed to bypass the 
sudo authentication: CVE-2013-1775, CVE-2013-1776, CVE-2013-2776 and 
CVE-2013-2777.

Security Issue references:

    * CVE-2013-1775
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775&gt;
    * CVE-2013-1776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776&gt;
    * CVE-2013-2776
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776&gt;
    * CVE-2013-2777
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-04-30"/>
	<updated date="2013-04-30"/>
	<bugzilla href="https://bugzilla.suse.com/806919">SUSE bug 806919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2776/">CVE-2013-2776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2777/">CVE-2013-2777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566188" comment="sudo-1.7.6p2-0.2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78242" version="1" class="patch">
	<metadata>
		<title>Security update for telepathy-gabble</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="807449" ref_url="https://bugzilla.suse.com/807449" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1769" ref_url="https://www.suse.com/security/cve/CVE-2013-1769/" source="CVE"/>
		<description>

telepathy-gabble was updated to fix several remotely-triggerable NULL 
crashes (CVE-2013-1769)

Security Issues:

    * CVE-2013-1769
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1769&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-15"/>
	<updated date="2013-03-15"/>
	<bugzilla href="https://bugzilla.suse.com/807449">SUSE bug 807449</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1769/">CVE-2013-1769</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563167" comment="telepathy-gabble-0.7.10-2.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78243" version="1" class="patch">
	<metadata>
		<title>Security update for telepathy-idle</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="817120" ref_url="https://bugzilla.suse.com/817120" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>

Telepathy-idle did not check SSL certificates. CVE-2007-6746 was assigned 
to this issue.

Security Issue reference:

    * CVE-2007-6746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6746&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-15"/>
	<updated date="2013-08-15"/>
	<bugzilla href="https://bugzilla.suse.com/817120">SUSE bug 817120</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566189" comment="telepathy-idle-0.1.5-1.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78244" version="1" class="patch">
	<metadata>
		<title>Security update for usbmuxd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="742546" ref_url="https://bugzilla.suse.com/742546" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0065" ref_url="https://www.suse.com/security/cve/CVE-2012-0065/" source="CVE"/>
		<description>

This update of usbmuxd fixes a heap-based buffer overflow which could be 
triggered via an overly long 'SerialNumber' field (CVE-2012-0065).

Security Issue reference:

    * CVE-2012-0065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0065&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-02-23"/>
	<updated date="2012-02-23"/>
	<bugzilla href="https://bugzilla.suse.com/742546">SUSE bug 742546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0065/">CVE-2012-0065</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566190" comment="usbmuxd-1.0.7-5.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78245" version="1" class="patch">
	<metadata>
		<title>Security update for vino</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="843174" ref_url="https://bugzilla.suse.com/843174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>

vino has been updated to fix a remote denial of service problem where 
remote attackers could have caused a infinite loop in vino (CPU 
consumption). (CVE-2013-5745)

Security Issue reference:

    * CVE-2013-5745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566191" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566192" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78246" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="855980" ref_url="https://bugzilla.suse.com/855980" source="BUGZILLA"/>
		<reference ref_id="856496" ref_url="https://bugzilla.suse.com/856496" source="BUGZILLA"/>
		<reference ref_id="856498" ref_url="https://bugzilla.suse.com/856498" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112/" source="CVE"/>
		<reference ref_id="CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113/" source="CVE"/>
		<reference ref_id="CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114/" source="CVE"/>
		<description>

wireshark was updated to security update version 1.8.12, fixing bugs and 
security issues.

    * The SIP dissector could go into an infinite loop.
      wnpa-sec-2013-66 CVE-2013-7112
    * The NTLMSSP v2 dissector could crash. Discovered by Garming Sam.
      wnpa-sec-2013-68 CVE-2013-7114

Further bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html&gt;

Security Issue references:

    * CVE-2013-7112
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112&gt;
    * CVE-2013-7113
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113&gt;
    * CVE-2013-7114
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-27"/>
	<updated date="2013-12-27"/>
	<bugzilla href="https://bugzilla.suse.com/855980">SUSE bug 855980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563168" comment="wireshark-1.8.12-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78247" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="793927" ref_url="https://bugzilla.suse.com/793927" source="BUGZILLA"/>
		<reference ref_id="794316" ref_url="https://bugzilla.suse.com/794316" source="BUGZILLA"/>
		<reference ref_id="797014" ref_url="https://bugzilla.suse.com/797014" source="BUGZILLA"/>
		<reference ref_id="797031" ref_url="https://bugzilla.suse.com/797031" source="BUGZILLA"/>
		<reference ref_id="797523" ref_url="https://bugzilla.suse.com/797523" source="BUGZILLA"/>
		<reference ref_id="798188" ref_url="https://bugzilla.suse.com/798188" source="BUGZILLA"/>
		<reference ref_id="799694" ref_url="https://bugzilla.suse.com/799694" source="BUGZILLA"/>
		<reference ref_id="800156" ref_url="https://bugzilla.suse.com/800156" source="BUGZILLA"/>
		<reference ref_id="800275" ref_url="https://bugzilla.suse.com/800275" source="BUGZILLA"/>
		<reference ref_id="802690" ref_url="https://bugzilla.suse.com/802690" source="BUGZILLA"/>
		<reference ref_id="805094" ref_url="https://bugzilla.suse.com/805094" source="BUGZILLA"/>
		<reference ref_id="806736" ref_url="https://bugzilla.suse.com/806736" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634/" source="CVE"/>
		<reference ref_id="CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075/" source="CVE"/>
		<reference ref_id="CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153/" source="CVE"/>
		<description>

XEN has been updated to fix various bugs and security issues:

    * 

      CVE-2013-0153: (XSA 36) To avoid an erratum in early hardware, the
      Xen AMD IOMMU code by default choose to use a single interrupt
      remapping table for the whole system. This sharing implied that any
      guest with a passed through PCI device that is bus mastering capable
      can inject interrupts into other guests, including domain 0. This has
      been disabled for AMD chipsets not capable of it.

    * 

      CVE-2012-6075: qemu: The e1000 had overflows under some conditions,
      potentially corrupting memory.

    * 

      CVE-2013-0154: (XSA 37) Hypervisor crash due to incorrect ASSERT
      (debug build only)

    * 

      CVE-2012-5634: (XSA-33) A VT-d interrupt remapping source validation
      flaw was fixed.

Also the following bugs have been fixed:

    * bnc#805094 - xen hot plug attach/detach fails
    * bnc#802690 - domain locking can prevent a live migration from
      completing
    * bnc#797014 - no way to control live migrations
          o fix logic error in stdiostream_progress
          o restore logging in xc_save
          o add options to control migration tunables
    * bnc#806736: enabling xentrace crashes hypervisor
    * Upstream patches from Jan 26287-sched-credit-pick-idle.patch
      26501-VMX-simplify-CR0-update.patch
      26502-VMX-disable-SMEP-when-not-paging.patch
      26516-ACPI-parse-table-retval.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch
      (Replaces CVE-2013-0153-xsa36.patch)
      26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces
      CVE-2013-0153-xsa36.patch)
      26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces
      CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch
      26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces
      CVE-2013-0153-xsa36.patch)
    * bnc#798188 - Add $network to xend initscript dependencies
    * bnc#799694 - Unable to dvd or cdrom-boot DomU after xen-tools update
      Fixed with update to Xen version 4.1.4
    * bnc#800156 - L3: HP iLo Generate NMI function not working in XEN
      kernel
    * Upstream patches from Jan 26404-x86-forward-both-NMI-kinds.patch
      26427-x86-AMD-enable-WC+.patch
    * bnc#793927 - Xen VMs with more than 2 disks randomly fail to start
    * Upstream patches from Jan 26332-x86-compat-show-guest-stack-mfn.patch
      26333-x86-get_page_type-assert.patch (Replaces
      CVE-2013-0154-xsa37.patch)
      26340-VT-d-intremap-verify-legacy-bridge.patch (Replaces
      CVE-2012-5634-xsa33.patch) 26370-libxc-x86-initial-mapping-fit.patch
    * Update to Xen 4.1.4 c/s 23432
    * Update xenpaging.guest-memusage.patch add rule for xenmem to avoid
      spurious build failures
    * Upstream patches from Jan 26179-PCI-find-next-cap.patch
      26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch
      26200-IOMMU-debug-verbose.patch 26203-x86-HAP-dirty-vram-leak.patch
      26229-gnttab-version-switch.patch (Replaces
      CVE-2012-5510-xsa26.patch) 26230-x86-HVM-limit-batches.patch
      (Replaces CVE-2012-5511-xsa27.patch)
      26231-memory-exchange-checks.patch (Replaces
      CVE-2012-5513-xsa29.patch) 26232-x86-mark-PoD-error-path.patch
      (Replaces CVE-2012-5514-xsa30.patch) 26233-memop-order-checks.patch
      (Replaces CVE-2012-5515-xsa31.patch)
      26235-IOMMU-ATS-max-queue-depth.patch
      26272-x86-EFI-makefile-cflags-filter.patch
      26294-x86-AMD-Fam15-way-access-filter.patch CVE-2013-0154-xsa37.patch
    * Restore c/s 25751 in 23614-x86_64-EFI-boot.patch. Modify the EFI
      Makefile to do additional filtering.

Security Issue references:

    * CVE-2013-0153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153&gt;
    * CVE-2012-6075
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075&gt;
    * CVE-2012-5634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-03-13"/>
	<updated date="2013-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/793927">SUSE bug 793927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797014">SUSE bug 797014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797031">SUSE bug 797031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798188">SUSE bug 798188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799694">SUSE bug 799694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800156">SUSE bug 800156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802690">SUSE bug 802690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805094">SUSE bug 805094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806736">SUSE bug 806736</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566193" comment="xen-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566194" comment="xen-doc-html-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566195" comment="xen-doc-pdf-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566196" comment="xen-kmp-default-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566197" comment="xen-kmp-pae-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566198" comment="xen-kmp-trace-4.1.4_02_3.0.58_0.6.6-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566199" comment="xen-libs-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566200" comment="xen-libs-32bit-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566201" comment="xen-tools-4.1.4_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566202" comment="xen-tools-domU-4.1.4_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78248" version="1" class="patch">
	<metadata>
		<title>Security update for Xen and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="746702" ref_url="https://bugzilla.suse.com/746702" source="BUGZILLA"/>
		<reference ref_id="762484" ref_url="https://bugzilla.suse.com/762484" source="BUGZILLA"/>
		<reference ref_id="762963" ref_url="https://bugzilla.suse.com/762963" source="BUGZILLA"/>
		<reference ref_id="764982" ref_url="https://bugzilla.suse.com/764982" source="BUGZILLA"/>
		<reference ref_id="766283" ref_url="https://bugzilla.suse.com/766283" source="BUGZILLA"/>
		<reference ref_id="773393" ref_url="https://bugzilla.suse.com/773393" source="BUGZILLA"/>
		<reference ref_id="773401" ref_url="https://bugzilla.suse.com/773401" source="BUGZILLA"/>
		<reference ref_id="773955" ref_url="https://bugzilla.suse.com/773955" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432/" source="CVE"/>
		<description>

Xen was updated to fix several security issues:

    * 

      CVE-2012-3433: A xen HVM guest destroy p2m teardown host DoS
      vulnerability was fixed, where malicious guest could lock/crash the
      host.

    * 

      CVE-2012-3432: A xen HVM guest user mode MMIO emulation DoS was
      fixed.

    * 

      CVE-2012-2625: The xen pv bootloader doesn't check the size of the
      bzip2 or lzma compressed kernel, leading to denial of service
      (crash).

Also the following bug in XEN has been fixed:

    * bnc#746702 - Xen HVM DomU crash during Windows Server 2008 R2
      install, when maxmem &gt; memory

This update also included bugfixes for:

    * 

      vm-install: - bnc#762963 - ReaR: Unable to recover a paravirtualized
      XEN guest

    * 

      virt-manager - SLE11-SP2 ONLY

    * bnc#764982 - virt-manager fails to start after upgrade to SLES11 SP2
      from SLES10

Security Issue reference:

    * CVE-2012-3432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-05"/>
	<updated date="2012-08-05"/>
	<bugzilla href="https://bugzilla.suse.com/746702">SUSE bug 746702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762484">SUSE bug 762484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762963">SUSE bug 762963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764982">SUSE bug 764982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766283">SUSE bug 766283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773955">SUSE bug 773955</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566203" comment="libvirt-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566204" comment="libvirt-client-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566205" comment="libvirt-client-32bit-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566206" comment="libvirt-doc-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566207" comment="libvirt-python-0.9.6-0.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566208" comment="virt-manager-0.9.0-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566209" comment="vm-install-0.5.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566210" comment="xen-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566211" comment="xen-doc-html-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566212" comment="xen-doc-pdf-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566213" comment="xen-kmp-default-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566214" comment="xen-kmp-trace-4.1.2_20_3.0.38_0.5-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566215" comment="xen-libs-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566216" comment="xen-libs-32bit-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566217" comment="xen-tools-4.1.2_20-0.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566218" comment="xen-tools-domU-4.1.2_20-0.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78249" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="776300" ref_url="https://bugzilla.suse.com/776300" source="BUGZILLA"/>
		<reference ref_id="776995" ref_url="https://bugzilla.suse.com/776995" source="BUGZILLA"/>
		<reference ref_id="777084" ref_url="https://bugzilla.suse.com/777084" source="BUGZILLA"/>
		<reference ref_id="777086" ref_url="https://bugzilla.suse.com/777086" source="BUGZILLA"/>
		<reference ref_id="777088" ref_url="https://bugzilla.suse.com/777088" source="BUGZILLA"/>
		<reference ref_id="777090" ref_url="https://bugzilla.suse.com/777090" source="BUGZILLA"/>
		<reference ref_id="777091" ref_url="https://bugzilla.suse.com/777091" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3494" ref_url="https://www.suse.com/security/cve/CVE-2012-3494/" source="CVE"/>
		<reference ref_id="CVE-2012-3495" ref_url="https://www.suse.com/security/cve/CVE-2012-3495/" source="CVE"/>
		<reference ref_id="CVE-2012-3496" ref_url="https://www.suse.com/security/cve/CVE-2012-3496/" source="CVE"/>
		<reference ref_id="CVE-2012-3498" ref_url="https://www.suse.com/security/cve/CVE-2012-3498/" source="CVE"/>
		<reference ref_id="CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515/" source="CVE"/>
		<description>

XEN was updated 4.1.3 to fix multiple bugs and security issues.

The following security issues have been fixed:

    * CVE-2012-3494: xen: hypercall set_debugreg vulnerability (XSA-12)
    * CVE-2012-3495: xen: hypercall physdev_get_free_pirq vulnerability
      (XSA-13)
    * CVE-2012-3496: xen: XENMEM_populate_physmap DoS vulnerability
      (XSA-14)
    * CVE-2012-3498: xen: PHYSDEVOP_map_pirq index vulnerability (XSA-16)
    * CVE-2012-3515: xen: Qemu VT100 emulation vulnerability (XSA-17)

Also the following bugs have been fixed:

    * pvscsi support of attaching Luns - bnc#776995

The following related bugs in vm-install 0.5.12 have been fixed:

    * bnc#776300 - vm-install does not pass --extra-args in --upgrade
    * Add for support Open Enterprise Server 11
    * Add support for Windows 8 and Windows Server 2012
    * Add support for Ubuntu 12 (Precise Pangolin)

Security Issue references:

    * CVE-2012-3496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496&gt;
    * CVE-2012-3494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494&gt;
    * CVE-2012-3495
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495&gt;
    * CVE-2012-3498
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498&gt;
    * CVE-2012-3515
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-08-30"/>
	<updated date="2012-08-30"/>
	<bugzilla href="https://bugzilla.suse.com/776300">SUSE bug 776300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776995">SUSE bug 776995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777086">SUSE bug 777086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777088">SUSE bug 777088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777090">SUSE bug 777090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777091">SUSE bug 777091</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3494/">CVE-2012-3494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3495/">CVE-2012-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3496/">CVE-2012-3496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3498/">CVE-2012-3498</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566219" comment="vm-install-0.5.12-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566220" comment="xen-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566221" comment="xen-doc-html-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566222" comment="xen-doc-pdf-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566223" comment="xen-kmp-default-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566224" comment="xen-kmp-trace-4.1.3_02_3.0.38_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566225" comment="xen-libs-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566226" comment="xen-libs-32bit-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566227" comment="xen-tools-4.1.3_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566228" comment="xen-tools-domU-4.1.3_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78250" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="777890" ref_url="https://bugzilla.suse.com/777890" source="BUGZILLA"/>
		<reference ref_id="778105" ref_url="https://bugzilla.suse.com/778105" source="BUGZILLA"/>
		<reference ref_id="779212" ref_url="https://bugzilla.suse.com/779212" source="BUGZILLA"/>
		<reference ref_id="784087" ref_url="https://bugzilla.suse.com/784087" source="BUGZILLA"/>
		<reference ref_id="786516" ref_url="https://bugzilla.suse.com/786516" source="BUGZILLA"/>
		<reference ref_id="786517" ref_url="https://bugzilla.suse.com/786517" source="BUGZILLA"/>
		<reference ref_id="786518" ref_url="https://bugzilla.suse.com/786518" source="BUGZILLA"/>
		<reference ref_id="786519" ref_url="https://bugzilla.suse.com/786519" source="BUGZILLA"/>
		<reference ref_id="786520" ref_url="https://bugzilla.suse.com/786520" source="BUGZILLA"/>
		<reference ref_id="787163" ref_url="https://bugzilla.suse.com/787163" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3497" ref_url="https://www.suse.com/security/cve/CVE-2012-3497/" source="CVE"/>
		<reference ref_id="CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411/" source="CVE"/>
		<reference ref_id="CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535/" source="CVE"/>
		<reference ref_id="CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536/" source="CVE"/>
		<reference ref_id="CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537/" source="CVE"/>
		<reference ref_id="CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538/" source="CVE"/>
		<reference ref_id="CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539/" source="CVE"/>
		<reference ref_id="CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544/" source="CVE"/>
		<description>

XEN was updated to fix various bugs and security issues:

The following security issues have been fixed:

    * CVE-2012-4544: xen: Domain builder Out-of-memory due to malicious
      kernel/ramdisk (XSA 25)
    * CVE-2012-4411: XEN / qemu: guest administrator can access qemu
      monitor console (XSA-19)
    * CVE-2012-4535: xen: Timer overflow DoS vulnerability (XSA 20)
    * CVE-2012-4536: xen: pirq range check DoS vulnerability (XSA 21)
    * CVE-2012-4537: xen: Memory mapping failure DoS vulnerability (XSA 22)
    * CVE-2012-4538: xen: Unhooking empty PAE entries DoS vulnerability
      (XSA 23)
    * CVE-2012-4539: xen: Grant table hypercall infinite loop DoS
      vulnerability (XSA 24)
    * CVE-2012-3497: xen: multiple TMEM hypercall vulnerabilities (XSA-15)

Also the following bugs have been fixed and upstream patches have been 
applied:

    * 

      bnc#784087 - L3: Xen BUG at io_apic.c:129
      26102-x86-IOAPIC-legacy-not-first.patch

    * 

      Upstream patches merged:
      26054-x86-AMD-perf-ctr-init.patch
      26055-x86-oprof-hvm-mode.patch
      26056-page-alloc-flush-filter.patch
      26061-x86-oprof-counter-range.patch
      26062-ACPI-ERST-move-data.patch
      26063-x86-HPET-affinity-lock.patch
      26093-HVM-PoD-grant-mem-type.patch
      25931-x86-domctl-iomem-mapping-checks.patch
      25952-x86-MMIO-remap-permissions.patch
      25808-domain_create-return-value.patch
      25814-x86_64-set-debugreg-guest.patch
      25815-x86-PoD-no-bug-in-non-translated.patch
      25816-x86-hvm-map-pirq-range-check.patch
      25833-32on64-bogus-pt_base-adjust.patch
      25834-x86-S3-MSI-resume.patch
      25835-adjust-rcu-lock-domain.patch
      25836-VT-d-S3-MSI-resume.patch
      25850-tmem-xsa-15-1.patch
      25851-tmem-xsa-15-2.patch
      25852-tmem-xsa-15-3.patch
      25853-tmem-xsa-15-4.patch
      25854-tmem-xsa-15-5.patch
      25855-tmem-xsa-15-6.patch
      25856-tmem-xsa-15-7.patch
      25857-tmem-xsa-15-8.patch
      25858-tmem-xsa-15-9.patch
      25859-tmem-missing-break.patch
      25860-tmem-cleanup.patch
      25883-pt-MSI-cleanup.patch
      25927-x86-domctl-ioport-mapping-range.patch
      25929-tmem-restore-pool-version.patch

    * 

      bnc#778105 - first XEN-PV VM fails to spawn
      xend: Increase wait time for disk to appear in host bootloader
      Modified existing xen-domUloader.diff

      25752-ACPI-pm-op-valid-cpu.patch
      25754-x86-PoD-early-access.patch
      25755-x86-PoD-types.patch
      25756-x86-MMIO-max-mapped-pfn.patch

Security Issue references:

    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-3497
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497&gt;
    * CVE-2012-4411
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411&gt;
    * CVE-2012-4535
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535&gt;
    * CVE-2012-4537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537&gt;
    * CVE-2012-4536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536&gt;
    * CVE-2012-4538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538&gt;
    * CVE-2012-4539
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539&gt;
    * CVE-2012-4544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-11-02"/>
	<updated date="2012-11-02"/>
	<bugzilla href="https://bugzilla.suse.com/777890">SUSE bug 777890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778105">SUSE bug 778105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/784087">SUSE bug 784087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3497/">CVE-2012-3497</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566229" comment="xen-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566230" comment="xen-doc-html-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566231" comment="xen-doc-pdf-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566232" comment="xen-kmp-default-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566233" comment="xen-kmp-pae-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566234" comment="xen-kmp-trace-4.1.3_04_3.0.42_0.7-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566235" comment="xen-libs-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566236" comment="xen-libs-32bit-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566237" comment="xen-tools-4.1.3_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566238" comment="xen-tools-domU-4.1.3_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78251" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="801663" ref_url="https://bugzilla.suse.com/801663" source="BUGZILLA"/>
		<reference ref_id="809662" ref_url="https://bugzilla.suse.com/809662" source="BUGZILLA"/>
		<reference ref_id="813673" ref_url="https://bugzilla.suse.com/813673" source="BUGZILLA"/>
		<reference ref_id="813675" ref_url="https://bugzilla.suse.com/813675" source="BUGZILLA"/>
		<reference ref_id="813677" ref_url="https://bugzilla.suse.com/813677" source="BUGZILLA"/>
		<reference ref_id="814709" ref_url="https://bugzilla.suse.com/814709" source="BUGZILLA"/>
		<reference ref_id="816156" ref_url="https://bugzilla.suse.com/816156" source="BUGZILLA"/>
		<reference ref_id="816159" ref_url="https://bugzilla.suse.com/816159" source="BUGZILLA"/>
		<reference ref_id="816163" ref_url="https://bugzilla.suse.com/816163" source="BUGZILLA"/>
		<reference ref_id="819416" ref_url="https://bugzilla.suse.com/819416" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="820920" ref_url="https://bugzilla.suse.com/820920" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919/" source="CVE"/>
		<reference ref_id="CVE-2013-1920" ref_url="https://www.suse.com/security/cve/CVE-2013-1920/" source="CVE"/>
		<reference ref_id="CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952/" source="CVE"/>
		<reference ref_id="CVE-2013-1964" ref_url="https://www.suse.com/security/cve/CVE-2013-1964/" source="CVE"/>
		<reference ref_id="CVE-2013-2072" ref_url="https://www.suse.com/security/cve/CVE-2013-2072/" source="CVE"/>
		<reference ref_id="CVE-2013-2076" ref_url="https://www.suse.com/security/cve/CVE-2013-2076/" source="CVE"/>
		<reference ref_id="CVE-2013-2077" ref_url="https://www.suse.com/security/cve/CVE-2013-2077/" source="CVE"/>
		<reference ref_id="CVE-2013-2078" ref_url="https://www.suse.com/security/cve/CVE-2013-2078/" source="CVE"/>
		<description>

XEN has been updated to 4.1.5 c/s 23509 to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2013-1918: Certain page table manipulation operations in Xen
      4.1.x, 4.2.x, and earlier were not preemptible, which allowed local
      PV kernels to cause a denial of service via vectors related to deep
      page table traversal.

    * 

      CVE-2013-1952: Xen 4.x, when using Intel VT-d for a bus mastering
      capable PCI device, did not properly check the source when accessing
      a bridge devices interrupt remapping table entries for MSI
      interrupts, which allowed local guest domains to cause a denial of
      service (interrupt injection) via unspecified vectors.

    * 

      CVE-2013-2076: A information leak in the XSAVE/XRSTOR instructions
      could be used to determine state of floating point operations in
      other domains.

    * 

      CVE-2013-2077: A denial of service (hypervisor crash) was possible
      due to missing exception recovery on XRSTOR, that could be used to
      crash the machine by PV guest users.

    * 

      CVE-2013-2078: A denial of service (hypervisor crash) was possible
      due to missing exception recovery on XSETBV, that could be used to
      crash the machine by PV guest users.

    * 

      CVE-2013-2072: Systems which allow untrusted administrators to
      configure guest vcpu affinity may be exploited to trigger a buffer
      overrun and corrupt memory.

    * 

      CVE-2013-1917: Xen 3.1 through 4.x, when running 64-bit hosts on
      Intel CPUs, did not clear the NT flag when using an IRET after a
      SYSENTER instruction, which allowed PV guest users to cause a denial
      of service (hypervisor crash) by triggering a #GP fault, which is not
      properly handled by another IRET instruction.

    * 

      CVE-2013-1919: Xen 4.2.x and 4.1.x did not properly restrict access
      to IRQs, which allowed local stub domain clients to gain access to
      IRQs and cause a denial of service via vectors related to
      'passed-through IRQs or PCI devices.'

    * 

      CVE-2013-1920: Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is
      running 'under memory pressure' and the Xen Security Module (XSM) is
      enabled, used the wrong ordering of operations when extending the
      per-domain event channel tracking table, which caused a
      use-after-free and allowed local guest kernels to inject arbitrary
      events and gain privileges via unspecified vectors.

    * 

      CVE-2013-1964: Xen 4.0.x and 4.1.x incorrectly released a grant
      reference when releasing a non-v1, non-transitive grant, which
      allowed local guest administrators to cause a denial of service (host
      crash), obtain sensitive information, or possible have other impacts
      via unspecified vectors.

Bugfixes:

    * 

      Upstream patches from Jan
      26956-x86-mm-preemptible-cleanup.patch
      27071-x86-IO-APIC-fix-guest-RTE-write-corner-cases.patch
      27072-x86-shadow-fix-off-by-one-in-MMIO-permission-check.patch
      27079-fix-XSA-46-regression-with-xend-xm.patch
      27083-AMD-iommu-SR56x0-Erratum-64-Reset-all-head-tail-pointers.patch

    * 

      Update to Xen 4.1.5 c/s 23509
      There were many xen.spec file patches dropped as now being included
      in the 4.1.5 tarball.

    * 

      bnc#809662 - can't use pv-grub to start domU (pygrub does work)
      xen.spec

    * 

      Upstream patches from Jan
      26702-powernow-add-fixups-for-AMD-P-state-figures.patch
      26704-x86-MCA-suppress-bank-clearing-for-certain-injected-events.patch
      26731-AMD-IOMMU-Process-softirqs-while-building-dom0-iommu-mappings.patch
      26733-VT-d-Enumerate-IOMMUs-when-listing-capabilities.patch
      26734-ACPI-ERST-Name-table-in-otherwise-opaque-error-messages.patch
      26736-ACPI-APEI-Unlock-apei_iomaps_lock-on-error-path.patch
      26737-ACPI-APEI-Add-apei_exec_run_optional.patch
      26742-IOMMU-properly-check-whether-interrupt-remapping-is-enabled.patch
      26743-VT-d-deal-with-5500-5520-X58-errata.patch
      26744-AMD-IOMMU-allow-disabling-only-interrupt-remapping.patch
      26749-x86-reserve-pages-when-SandyBridge-integrated-graphics.patch
      26765-hvm-Clean-up-vlapic_reg_write-error-propagation.patch
      26770-x86-irq_move_cleanup_interrupt-must-ignore-legacy-vectors.patch
      26771-x86-S3-Restore-broken-vcpu-affinity-on-resume.patch
      26772-VMX-Always-disable-SMEP-when-guest-is-in-non-paging-mode.patch
      26773-x86-mm-shadow-spurious-warning-when-unmapping-xenheap-pages.patch
      26799-x86-don-t-pass-negative-time-to-gtime_to_gtsc.patch
      26851-iommu-crash-Interrupt-remapping-is-also-disabled-on-crash.patch

    * 

      bnc#814709 - Unable to create XEN virtual machines in SLED 11 SP2 on
      Kyoto
      xend-cpuinfo-model-name.patch

    * 

      Upstream patches from Jan
      26536-xenoprof-div-by-0.patch
      26578-AMD-IOMMU-replace-BUG_ON.patch
      26656-x86-fix-null-pointer-dereference-in-intel_get_extended_msrs.patch
      26659-AMD-IOMMU-erratum-746-workaround.patch
      26660-x86-fix-CMCI-injection.patch
      26672-vmx-fix-handling-of-NMI-VMEXIT.patch
      26673-Avoid-stale-pointer-when-moving-domain-to-another-cpupool.patch
      26676-fix-compat-memory-exchange-op-splitting.patch
      26677-x86-make-certain-memory-sub-ops-return-valid-values.patch
      26678-SEDF-avoid-gathering-vCPU-s-on-pCPU0.patch
      26679-x86-defer-processing-events-on-the-NMI-exit-path.patch
      26683-credit1-Use-atomic-bit-operations-for-the-flags-structure.patch
      26692-x86-MSI-fully-protect-MSI-X-table.patch

Security Issue references:

    * CVE-2013-1917
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-1919
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919&gt;
    * CVE-2013-1920
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920&gt;
    * CVE-2013-1952
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952&gt;
    * CVE-2013-1964
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964&gt;
    * CVE-2013-2072
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072&gt;
    * CVE-2013-2076
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076&gt;
    * CVE-2013-2077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077&gt;
    * CVE-2013-2078
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/801663">SUSE bug 801663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809662">SUSE bug 809662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813677">SUSE bug 813677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814709">SUSE bug 814709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816156">SUSE bug 816156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819416">SUSE bug 819416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1920/">CVE-2013-1920</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1964/">CVE-2013-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2072/">CVE-2013-2072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2076/">CVE-2013-2076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2077/">CVE-2013-2077</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2078/">CVE-2013-2078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566239" comment="xen-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566240" comment="xen-doc-html-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566241" comment="xen-doc-pdf-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566242" comment="xen-kmp-default-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566243" comment="xen-kmp-pae-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566244" comment="xen-kmp-trace-4.1.5_02_3.0.74_0.6.10-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566245" comment="xen-libs-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566246" comment="xen-libs-32bit-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566247" comment="xen-tools-4.1.5_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566248" comment="xen-tools-domU-4.1.5_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78252" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="803712" ref_url="https://bugzilla.suse.com/803712" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="823786" ref_url="https://bugzilla.suse.com/823786" source="BUGZILLA"/>
		<reference ref_id="824676" ref_url="https://bugzilla.suse.com/824676" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="828623" ref_url="https://bugzilla.suse.com/828623" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="833796" ref_url="https://bugzilla.suse.com/833796" source="BUGZILLA"/>
		<reference ref_id="834751" ref_url="https://bugzilla.suse.com/834751" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839600" ref_url="https://bugzilla.suse.com/839600" source="BUGZILLA"/>
		<reference ref_id="839618" ref_url="https://bugzilla.suse.com/839618" source="BUGZILLA"/>
		<reference ref_id="840196" ref_url="https://bugzilla.suse.com/840196" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="845520" ref_url="https://bugzilla.suse.com/845520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<reference ref_id="CVE-2013-2211" ref_url="https://www.suse.com/security/cve/CVE-2013-2211/" source="CVE"/>
		<reference ref_id="CVE-2013-4329" ref_url="https://www.suse.com/security/cve/CVE-2013-4329/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<description>

XEN has been updated to version 4.1.6 which fixes various bugs and security 
issues.

    * CVE-2013-4416: XSA-72: Fixed ocaml xenstored that mishandled
      oversized message replies.
    * CVE-2013-4355: XSA-63: Fixed information leaks through I/O
      instruction emulation
    * CVE-2013-4361: XSA-66: Fixed information leak through fbld
      instruction emulation
    * CVE-2013-4368: XSA-67: Fixed information leak through outs
      instruction emulation
    * CVE-2013-1442: XSA-62: Fixed information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-4329: XSA-61: libxl partially sets up HVM passthrough even
      with disabled iommu
    * CVE-2013-1432: XSA-58: x86: fix page refcount handling in page table
      pin error path
    * CVE-2013-2211: XSA-57: libxl allows guest write access to sensitive
      console related xenstore keys
    * xen: XSA-55: Multiple vulnerabilities in libelf PV kernel handling
      (CVE-2013-2194 CVE-2013-2195 CVE-2013-2196)

Various bugs have also been fixed:

    * Improvements to block-dmmd script (bnc#828623)
    * MTU size on Dom0 gets reset when booting DomU with e1000 device
      (bnc#840196)
    * In HP's UEFI x86_64 platform and with xen environment, in booting
      stage ,xen hypervisor will panic. (bnc#833251)
    * Xen: migration broken from xsave-capable to xsave-incapable host
      (bnc#833796)
    * In xen, 'shutdown -y 0 -h' cannot power off system (bnc#834751)
    * In HP's UEFI x86_64 platform and sles11sp3 with xen environment, xen
      hypervisor will panic on multiple blades nPar. (bnc#839600)
    * Failed to setup devices for vm instance when start multiple vms
      simultaneously (bnc#824676)
    * migrate.py support of short options dropped by PTF (bnc#824676)
    * after live migration rcu_sched_state detected stalls add new option
      xm migrate --min_remaing (bnc#803712)
    * various upstream fixes have been included

Security Issue references:

    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;
    * CVE-2013-2211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211&gt;
    * CVE-2013-4329
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/803712">SUSE bug 803712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823786">SUSE bug 823786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824676">SUSE bug 824676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828623">SUSE bug 828623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833796">SUSE bug 833796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834751">SUSE bug 834751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839600">SUSE bug 839600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839618">SUSE bug 839618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840196">SUSE bug 840196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2211/">CVE-2013-2211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4329/">CVE-2013-4329</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566249" comment="xen-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566250" comment="xen-doc-html-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566251" comment="xen-doc-pdf-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566252" comment="xen-kmp-default-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566253" comment="xen-kmp-pae-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566254" comment="xen-kmp-trace-4.1.6_02_3.0.93_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566255" comment="xen-libs-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566256" comment="xen-libs-32bit-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566257" comment="xen-tools-4.1.6_02-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566258" comment="xen-tools-domU-4.1.6_02-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78253" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="840997" ref_url="https://bugzilla.suse.com/840997" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<description>

Xen has been updated to fix a security issue and a bug:

    * CVE-2013-4494: XSA-73: A lock order reversal between page allocation
      and grant table locks could lead to host crashes or even host code
      execution.

A non-security bug has also been fixed:

    * It is possible to start a VM twice on the same node (bnc#840997)

Security Issue references:

    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-25"/>
	<updated date="2013-11-25"/>
	<bugzilla href="https://bugzilla.suse.com/840997">SUSE bug 840997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566259" comment="xen-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566260" comment="xen-doc-html-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566261" comment="xen-doc-pdf-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566262" comment="xen-kmp-default-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566263" comment="xen-kmp-pae-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566264" comment="xen-kmp-trace-4.1.6_04_3.0.101_0.5-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566265" comment="xen-libs-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566266" comment="xen-libs-32bit-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566267" comment="xen-tools-4.1.6_04-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566268" comment="xen-tools-domU-4.1.6_04-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78254" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="853846" ref_url="https://bugzilla.suse.com/853846" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424/" source="CVE"/>
		<description>

This update fixes the following security issue with xorg-x11-server:

    * bnc#853846: integer underflow when handling trapezoids
      (CVE-2013-6424)

Security Issue reference:

    * CVE-2013-6424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566269" comment="xorg-x11-Xvnc-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566270" comment="xorg-x11-server-7.4-27.70.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566271" comment="xorg-x11-server-extra-7.4-27.70.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78255" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="854915" ref_url="https://bugzilla.suse.com/854915" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<description>

This update fixes a stack buffer overflow in xorg-x11 in the 
bdfReadCharacters() function. CVE-2013-6462 has been assigned to this 
issue.

Security Issue reference:

    * CVE-2013-6462
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-08"/>
	<updated date="2014-01-08"/>
	<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566272" comment="xorg-x11-devel-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566273" comment="xorg-x11-libs-7.4-8.26.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566274" comment="xorg-x11-libs-32bit-7.4-8.26.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78256" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues (bnc#815451, 
bnc#821664).

Security Issue references:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566275" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566276" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566277" comment="xorg-x11-libX11-devel-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78257" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues 
(bnc#815451, bnc#821665, CVE-2013-1982)

Security Issue reference:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566278" comment="xorg-x11-libXext-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566279" comment="xorg-x11-libXext-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566280" comment="xorg-x11-libXext-devel-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78258" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixes a integer overflow issue 
(bnc#815451, bnc#821667, CVE-2013-1983).

Security Issue reference:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-31"/>
	<updated date="2013-05-31"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566281" comment="xorg-x11-libXfixes-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566282" comment="xorg-x11-libXfixes-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566283" comment="xorg-x11-libXfixes-devel-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78259" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues 
(bnc#815451, bnc#821668, CVE-2013-2062).

Security Issue reference:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566284" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566285" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566286" comment="xorg-x11-libXp-devel-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78260" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues 
(bnc#815451, bnc#821669, CVE-2013-1987).

Security Issue reference:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-03"/>
	<updated date="2013-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566287" comment="xorg-x11-libXrender-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566288" comment="xorg-x11-libXrender-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566289" comment="xorg-x11-libXrender-devel-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78261" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821670, CVE-2013-2002, CVE-2013-2005).

Security Issue references:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566290" comment="xorg-x11-libXt-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566291" comment="xorg-x11-libXt-32bit-7.4-1.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566292" comment="xorg-x11-libXt-devel-7.4-1.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78262" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues (bnc#815451, bnc#821671, CVE-2013-1989, CVE-2013-2066).

Security Issue references:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-04"/>
	<updated date="2013-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566293" comment="xorg-x11-libXv-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566294" comment="xorg-x11-libXv-32bit-7.4-1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566295" comment="xorg-x11-libXv-devel-7.4-1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78263" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libxcb</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="818829" ref_url="https://bugzilla.suse.com/818829" source="BUGZILLA"/>
		<reference ref_id="821584" ref_url="https://bugzilla.suse.com/821584" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>

This update for xorg-x11-libxcb addresses the following security issues:

    * Fix a deadlock with multi-threaded applications running on real time
      kernels. (bnc#818829)
    * Fix an integer overflow in read_packet(). (bnc#821584, CVE-2013-2064)

Security Issues:

    * CVE-2013-2064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-05-24"/>
	<updated date="2013-05-24"/>
	<bugzilla href="https://bugzilla.suse.com/818829">SUSE bug 818829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566296" comment="xorg-x11-libxcb-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566297" comment="xorg-x11-libxcb-32bit-7.4-1.22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566298" comment="xorg-x11-libxcb-devel-7.4-1.22.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78264" version="1" class="patch">
	<metadata>
		<title>Security update for zypper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP2</platform>
		</affected>
		<reference ref_id="770630" ref_url="https://bugzilla.suse.com/770630" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0420" ref_url="https://www.suse.com/security/cve/CVE-2012-0420/" source="CVE"/>
		<description>

The following issue has been fixed:

    * The zypper setuid wrapper linked against libzypp. This is not needed
      and added unnecessary attack vectors. CVE-2012-0420 has been assigned
      to this issue.

Security Issue reference:

    * CVE-2012-0420
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0420&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2012-07-10"/>
	<updated date="2012-07-10"/>
	<bugzilla href="https://bugzilla.suse.com/770630">SUSE bug 770630</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0420/">CVE-2012-0420</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073771" comment="SUSE Linux Enterprise Desktop 11 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566299" comment="zypper-1.6.166-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566300" comment="zypper-log-1.6.166-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78265" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="881874" ref_url="https://bugzilla.suse.com/881874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1533" ref_url="https://www.suse.com/security/cve/CVE-2014-1533/" source="CVE"/>
		<reference ref_id="CVE-2014-1534" ref_url="https://www.suse.com/security/cve/CVE-2014-1534/" source="CVE"/>
		<reference ref_id="CVE-2014-1536" ref_url="https://www.suse.com/security/cve/CVE-2014-1536/" source="CVE"/>
		<reference ref_id="CVE-2014-1537" ref_url="https://www.suse.com/security/cve/CVE-2014-1537/" source="CVE"/>
		<reference ref_id="CVE-2014-1538" ref_url="https://www.suse.com/security/cve/CVE-2014-1538/" source="CVE"/>
		<reference ref_id="CVE-2014-1541" ref_url="https://www.suse.com/security/cve/CVE-2014-1541/" source="CVE"/>
		<reference ref_id="CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545/" source="CVE"/>
		<description>

MozillaFirefox was updated to version 24.6.0 to fix six security issues:

    * Miscellaneous memory safety hazards. (CVE-2014-1533, CVE-2014-1534)
    * Use-after-free and out of bounds issues found using Address
      Sanitizer. (CVE-2014-1536, CVE-2014-1537, CVE-2014-1538)
    * Use-after-free with SMIL Animation Controller. (CVE-2014-1541)

mozilla-nspr was updated to version 4.10.6 to fix one security issue:

    * Out of bounds write in NSPR. (CVE-2014-1545)

Further information can be found at 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues references:

    * CVE-2014-1533
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533&gt;
    * CVE-2014-1534
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534&gt;
    * CVE-2014-1536
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536&gt;
    * CVE-2014-1537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537&gt;
    * CVE-2014-1538
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538&gt;
    * CVE-2014-1541
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541&gt;
    * CVE-2014-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-12"/>
	<updated date="2014-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/881874">SUSE bug 881874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1533/">CVE-2014-1533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1534/">CVE-2014-1534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1536/">CVE-2014-1536</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1537/">CVE-2014-1537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1538/">CVE-2014-1538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1541/">CVE-2014-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566301" comment="MozillaFirefox-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566302" comment="MozillaFirefox-branding-SLED-24-0.7.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566303" comment="MozillaFirefox-translations-24.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566304" comment="libfreebl3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566305" comment="libfreebl3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566306" comment="libsoftokn3-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566307" comment="libsoftokn3-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566308" comment="mozilla-nspr-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566309" comment="mozilla-nspr-32bit-4.10.6-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566310" comment="mozilla-nss-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566311" comment="mozilla-nss-32bit-3.16.1-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566312" comment="mozilla-nss-tools-3.16.1-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78266" version="1" class="patch">
	<metadata>
		<title>Security update for Image Magick</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="903204" ref_url="https://bugzilla.suse.com/903204" source="BUGZILLA"/>
		<reference ref_id="903216" ref_url="https://bugzilla.suse.com/903216" source="BUGZILLA"/>
		<reference ref_id="903638" ref_url="https://bugzilla.suse.com/903638" source="BUGZILLA"/>
		<reference ref_id="905260" ref_url="https://bugzilla.suse.com/905260" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354/" source="CVE"/>
		<reference ref_id="CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355/" source="CVE"/>
		<reference ref_id="CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562/" source="CVE"/>
		<reference ref_id="CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716/" source="CVE"/>
		<description>

ImageMagick has been updated to fix four security issues:

    * Crafted jpeg file could have lead to a Denial of Service
      (CVE-2014-8716).
    * Out-of-bounds memory access in resize code (CVE-2014-8354)
    * Out-of-bounds memory access in PCX parser (CVE-2014-8355).
    * Out-of-bounds memory error in DCM decode (CVE-2014-8562).

Security Issues:

    * CVE-2014-8716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716&gt;
    * CVE-2014-8355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355&gt;
    * CVE-2014-8354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354&gt;
    * CVE-2014-8562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566313" comment="ImageMagick-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566314" comment="libMagick++1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566315" comment="libMagickCore1-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566316" comment="libMagickCore1-32bit-6.4.3.6-7.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566317" comment="libMagickWand1-6.4.3.6-7.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78267" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="840485" ref_url="https://bugzilla.suse.com/840485" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705/" source="CVE"/>
		<reference ref_id="CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718/" source="CVE"/>
		<reference ref_id="CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722/" source="CVE"/>
		<reference ref_id="CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725/" source="CVE"/>
		<reference ref_id="CVE-2013-1726" ref_url="https://www.suse.com/security/cve/CVE-2013-1726/" source="CVE"/>
		<reference ref_id="CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730/" source="CVE"/>
		<reference ref_id="CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732/" source="CVE"/>
		<reference ref_id="CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735/" source="CVE"/>
		<reference ref_id="CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736/" source="CVE"/>
		<reference ref_id="CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<description>

This update to Firefox 17.0.9esr (bnc#840485) addresses:

    * MFSA 2013-91 User-defined properties on DOM proxies get the wrong
      'this' object
          o (CVE-2013-1737)
    * MFSA 2013-90 Memory corruption involving scrolling
          o use-after-free in mozilla::layout::ScrollbarActivity
            (CVE-2013-1735)
          o Memory corruption in nsGfxScrollFrameInner::IsLTR()
            (CVE-2013-1736)
    * MFSA 2013-89 Buffer overflow with multi-column, lists, and floats
          o buffer overflow at nsFloatManager::GetFlowArea() with multicol,
            list, floats (CVE-2013-1732)
    * MFSA 2013-88 compartment mismatch re-attaching XBL-backed nodes
          o compartment mismatch in nsXBLBinding::DoInitJSClass
            (CVE-2013-1730)
    * MFSA 2013-83 Mozilla Updater does not lock MAR file after signature
      verification
          o MAR signature bypass in Updater could lead to downgrade
            (CVE-2013-1726)
    * MFSA 2013-82 Calling scope for new Javascript objects can lead to
      memory corruption
          o ABORT: bad scope for new JSObjects: ReparentWrapper /
            document.open (CVE-2013-1725)
    * MFSA 2013-79 Use-after-free in Animation Manager during stylesheet
      cloning
          o Heap-use-after-free in nsAnimationManager::BuildAnimations
            (CVE-2013-1722)
    * MFSA 2013-76 Miscellaneous memory safety hazards (rv:24.0 /
      rv:17.0.9)
          o Memory safety bugs fixed in Firefox 17.0.9 and Firefox 24.0
            (CVE-2013-1718)
    * MFSA 2013-65 Buffer underflow when generating CRMF requests
          o ASAN heap-buffer-overflow (read 1) in
            cryptojs_interpret_key_gen_type (CVE-2013-1705)

Security Issue references:

    * CVE-2013-1737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737&gt;
    * CVE-2013-1735
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735&gt;
    * CVE-2013-1736
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736&gt;
    * CVE-2013-1732
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732&gt;
    * CVE-2013-1730
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730&gt;
    * CVE-2013-1726
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726&gt;
    * CVE-2013-1725
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725&gt;
    * CVE-2013-1722
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722&gt;
    * CVE-2013-1718
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718&gt;
    * CVE-2013-1705
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-19"/>
	<updated date="2013-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1726/">CVE-2013-1726</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566318" comment="MozillaFirefox-17.0.9esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566319" comment="MozillaFirefox-translations-17.0.9esr-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78268" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<description>

This security update (bsc#940918) fixes the following issues:
  * MFSA 2015-78 (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566320" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566321" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78269" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 esr to fix the following issues: 

Following security issues were fixed:
* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78270" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="865539" ref_url="https://bugzilla.suse.com/865539" source="BUGZILLA"/>
		<reference ref_id="869827" ref_url="https://bugzilla.suse.com/869827" source="BUGZILLA"/>
		<reference ref_id="875378" ref_url="https://bugzilla.suse.com/875378" source="BUGZILLA"/>
		<reference ref_id="875803" ref_url="https://bugzilla.suse.com/875803" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1518" ref_url="https://www.suse.com/security/cve/CVE-2014-1518/" source="CVE"/>
		<reference ref_id="CVE-2014-1520" ref_url="https://www.suse.com/security/cve/CVE-2014-1520/" source="CVE"/>
		<reference ref_id="CVE-2014-1523" ref_url="https://www.suse.com/security/cve/CVE-2014-1523/" source="CVE"/>
		<reference ref_id="CVE-2014-1524" ref_url="https://www.suse.com/security/cve/CVE-2014-1524/" source="CVE"/>
		<reference ref_id="CVE-2014-1529" ref_url="https://www.suse.com/security/cve/CVE-2014-1529/" source="CVE"/>
		<reference ref_id="CVE-2014-1530" ref_url="https://www.suse.com/security/cve/CVE-2014-1530/" source="CVE"/>
		<reference ref_id="CVE-2014-1531" ref_url="https://www.suse.com/security/cve/CVE-2014-1531/" source="CVE"/>
		<reference ref_id="CVE-2014-1532" ref_url="https://www.suse.com/security/cve/CVE-2014-1532/" source="CVE"/>
		<description>

This Mozilla Firefox and Mozilla NSS update to 24.5.0esr fixes the 
following several security and non-security issues:

    * MFSA 2014-34/CVE-2014-1518
      Miscellaneous memory safety hazards
    * MFSA 2014-37/CVE-2014-1523
      Out of bounds read while decoding JPG images
    * MFSA 2014-38/CVE-2014-1524
      Buffer overflow when using non-XBL object as XBL
    * MFSA 2014-42/CVE-2014-1529
      Privilege escalation through Web Notification API
    * MFSA 2014-43/CVE-2014-1530
      Cross-site scripting (XSS) using history navigations
    * MFSA 2014-44/CVE-2014-1531
      Use-after-free in imgLoader while resizing images
    * MFSA 2014-46/CVE-2014-1532
      Use-after-free in nsHostResolver

Mozilla NSS has been updated to 3.16:

    * required for Firefox 29
    * CVE-2014-1492: In a wildcard certificate, the wildcard character
      should not be embedded within the U-label of an internationalized
      domain name. See the last bullet point in RFC 6125, Section 7.2.
    * Update of root certificates.

Security Issue references:

    * CVE-2014-1532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532&gt;
    * CVE-2014-1531
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531&gt;
    * CVE-2014-1530
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530&gt;
    * CVE-2014-1529
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529&gt;
    * CVE-2014-1524
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524&gt;
    * CVE-2014-1523
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523&gt;
    * CVE-2014-1520
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1520&gt;
    * CVE-2014-1518
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-01"/>
	<updated date="2014-05-01"/>
	<bugzilla href="https://bugzilla.suse.com/865539">SUSE bug 865539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875378">SUSE bug 875378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875803">SUSE bug 875803</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1518/">CVE-2014-1518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1520/">CVE-2014-1520</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1523/">CVE-2014-1523</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1524/">CVE-2014-1524</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1529/">CVE-2014-1529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1530/">CVE-2014-1530</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1531/">CVE-2014-1531</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1532/">CVE-2014-1532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566324" comment="MozillaFirefox-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566325" comment="MozillaFirefox-branding-SLED-24-0.7.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566326" comment="MozillaFirefox-translations-24.5.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566327" comment="libfreebl3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566328" comment="libfreebl3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566329" comment="libsoftokn3-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566330" comment="libsoftokn3-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566333" comment="mozilla-nss-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566334" comment="mozilla-nss-32bit-3.16-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566335" comment="mozilla-nss-tools-3.16-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78271" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="925368" ref_url="https://bugzilla.suse.com/925368" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to 31.6.0 ESR to fix five security issues.

The following vulnerabilities have been fixed:

    * Miscellaneous memory safety hazards (MFSA
      2015-30/CVE-2015-0814/CVE-2015-0815)
    * Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA
      2015-31/CVE-2015-0813)
    * resource:// documents can load privileged pages (MFSA
      2015-33/CVE-2015-0816)
    * CORS requests should not follow 30x redirections after preflight
      (MFSA 2015-37/CVE-2015-0807)
    * Same-origin bypass through anchor navigation (MFSA
      2015-40/CVE-2015-0801)

Security Issues:

    * CVE-2015-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801&gt;
    * CVE-2015-0807
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807&gt;
    * CVE-2015-0813
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813&gt;
    * CVE-2015-0814
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814&gt;
    * CVE-2015-0816
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-02"/>
	<updated date="2015-04-02"/>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566336" comment="MozillaFirefox-31.6.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566337" comment="MozillaFirefox-translations-31.6.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78272" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78273" version="1" class="patch">
	<metadata>
		<title>Security update for a2ps</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="871097" ref_url="https://bugzilla.suse.com/871097" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0466" ref_url="https://www.suse.com/security/cve/CVE-2014-0466/" source="CVE"/>
		<description>

The text to postscript converter a2ps received a security update.

The fixps script did not call ghostscript with the -DSAFER option, allowing 
command execution by attacker supplied postscript files.

Security Issue reference:

    * CVE-2014-0466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-31"/>
	<updated date="2014-03-31"/>
	<bugzilla href="https://bugzilla.suse.com/871097">SUSE bug 871097</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0466/">CVE-2014-0466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566349" comment="a2ps-4.13-1326.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78274" version="1" class="patch">
	<metadata>
		<title>Security update for acroread</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843835" ref_url="https://bugzilla.suse.com/843835" source="BUGZILLA"/>
		<description>

Adobe has discontinued the support of Adobe Reader for Linux in June 2013.

Newer security problems and bugs are no longer fixed.

As the Adobe Reader is binary only software and we cannot provide a 
replacement, SUSE declares the acroread package of Adobe Reader as being 
out of support and unmaintained.

If you do not need Acrobat Reader, we recommend to uninstall the 'acroread' 
package.

This update removes the Acrobat Reader PDF plugin to avoid automatic 
exploitation by clicking on web pages with embedded PDFs.

The stand alone 'acroread' binary is still available, but again, we do not 
recommend to use it.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-20"/>
	<updated date="2013-12-20"/>
	<bugzilla href="https://bugzilla.suse.com/843835">SUSE bug 843835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565848" comment="acroread-9.5.5-0.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565849" comment="acroread-cmaps-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565850" comment="acroread-fonts-ja-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565851" comment="acroread-fonts-ko-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565852" comment="acroread-fonts-zh_CN-9.4.6-0.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565853" comment="acroread-fonts-zh_TW-9.4.6-0.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78275" version="1" class="patch">
	<metadata>
		<title>Security update for augeas</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="853044" ref_url="https://bugzilla.suse.com/853044" source="BUGZILLA"/>
		<reference ref_id="871323" ref_url="https://bugzilla.suse.com/871323" source="BUGZILLA"/>
		<reference ref_id="876044" ref_url="https://bugzilla.suse.com/876044" source="BUGZILLA"/>
		<reference ref_id="885003" ref_url="https://bugzilla.suse.com/885003" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2013-6412" ref_url="https://www.suse.com/security/cve/CVE-2013-6412/" source="CVE"/>
		<description>

Augeas has been updated to fix a symlink overwrite problem (CVE-2012-0786, 
CVE-2013-6412).

Also a bug has been fixed where 'augtool -s set was failing' (bnc#876044)

Additionally parsing the multipath configuration has been fixed. bnc#871323

Security Issues:

    * CVE-2012-0786
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786&gt;
    * CVE-2013-6412
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6412&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-30"/>
	<updated date="2014-07-30"/>
	<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871323">SUSE bug 871323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876044">SUSE bug 876044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6412/">CVE-2013-6412</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566350" comment="libaugeas0-0.9.0-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78276" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566351" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78277" version="1" class="patch">
	<metadata>
		<title>Security update for bash</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="898346" ref_url="https://bugzilla.suse.com/898346" source="BUGZILLA"/>
		<reference ref_id="898603" ref_url="https://bugzilla.suse.com/898603" source="BUGZILLA"/>
		<reference ref_id="898604" ref_url="https://bugzilla.suse.com/898604" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169/" source="CVE"/>
		<reference ref_id="CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186/" source="CVE"/>
		<reference ref_id="CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187/" source="CVE"/>
		<description>

The command-line shell 'bash' evaluates environment variables, which allows 
the injection of characters and might be used to access files on the system 
in some circumstances (CVE-2014-7169).

Please note that this issue is different from a previously fixed 
vulnerability tracked under CVE-2014-6271 and is less serious due to the 
special, non-default system configuration that is needed to create an 
exploitable situation.

To remove further exploitation potential we now limit the 
function-in-environment variable to variables prefixed with BASH_FUNC_. 
This hardening feature is work in progress and might be improved in later 
updates.

Additionally, two other security issues have been fixed:

    * CVE-2014-7186: Nested HERE documents could lead to a crash of bash.
    * CVE-2014-7187: Nesting of for loops could lead to a crash of bash.

Security Issues:

    * CVE-2014-7169
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169&gt;
    * CVE-2014-7186
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186&gt;
    * CVE-2014-7187
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566352" comment="bash-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566353" comment="bash-doc-3.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563235" comment="libreadline5-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566354" comment="libreadline5-32bit-5.2-147.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566355" comment="readline-doc-5.2-147.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78278" version="1" class="patch">
	<metadata>
		<title>Security update for bind</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="858639" ref_url="https://bugzilla.suse.com/858639" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html" source="SUSE-SU"/>
		<description>

This update fixes a DoS vulnerability in bind when handling malformed 
NSEC3-signed zones. CVE-2014-0591 has been assigned to this issue.

Security Issue references:

    * CVE-2014-0591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009565855" comment="bind-libs-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565856" comment="bind-libs-32bit-9.9.4P2-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009565857" comment="bind-utils-9.9.4P2-0.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78279" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566356" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566357" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566358" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78280" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566359" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566360" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566361" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78281" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566362" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566363" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566364" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78282" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566365" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566366" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566367" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78283" version="1" class="patch">
	<metadata>
		<title>Security update for binutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="902676" ref_url="https://bugzilla.suse.com/902676" source="BUGZILLA"/>
		<reference ref_id="902677" ref_url="https://bugzilla.suse.com/902677" source="BUGZILLA"/>
		<reference ref_id="903655" ref_url="https://bugzilla.suse.com/903655" source="BUGZILLA"/>
		<reference ref_id="905735" ref_url="https://bugzilla.suse.com/905735" source="BUGZILLA"/>
		<reference ref_id="905736" ref_url="https://bugzilla.suse.com/905736" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484/" source="CVE"/>
		<reference ref_id="CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485/" source="CVE"/>
		<reference ref_id="CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501/" source="CVE"/>
		<reference ref_id="CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502/" source="CVE"/>
		<reference ref_id="CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503/" source="CVE"/>
		<reference ref_id="CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504/" source="CVE"/>
		<reference ref_id="CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737/" source="CVE"/>
		<reference ref_id="CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738/" source="CVE"/>
		<description>

binutils has been updated to fix eight security issues:

    * Lack of range checking leading to controlled write in
      _bfd_elf_setup_sections() (CVE-2014-8485).
    * Invalid read flaw in libbfd (CVE-2014-8484).
    * Write to uninitialized memory in the PE parser (CVE-2014-8501).
    * Crash in the PE parser (CVE-2014-8502).
    * Segfault in the ihex parser when it encounters a malformed ihex file
      (CVE-2014-8503).
    * Stack buffer overflow in srec_scan (CVE-2014-8504).
    * Out-of-bounds memory write while processing a crafted 'ar' archive
      (CVE-2014-8738).
    * Directory traversal vulnerability allowing random file
      deletion/creation (CVE-2014-8737).

Security Issues:

    * CVE-2014-8501
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501&gt;
    * CVE-2014-8502
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502&gt;
    * CVE-2014-8503
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503&gt;
    * CVE-2014-8504
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504&gt;
    * CVE-2014-8485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485&gt;
    * CVE-2014-8738
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738&gt;
    * CVE-2014-8484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484&gt;
    * CVE-2014-8737
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-22"/>
	<updated date="2015-01-22"/>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566368" comment="binutils-2.23.1-0.23.15 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78284" version="1" class="patch">
	<metadata>
		<title>Security update for cabextract</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="627753" ref_url="https://bugzilla.suse.com/627753" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800/" source="CVE"/>
		<reference ref_id="CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801/" source="CVE"/>
		<description>

cabextract was updated to fix two security issues:

    * CVE-2010-2800: A potential endless loop in decoding files.
    * CVE-2010-2801: Memory corruption due to integer overflows in buffer
      read handling.

Security Issues references:

    * CVE-2010-2800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2800&gt;
    * CVE-2010-2801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2801&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-27"/>
	<updated date="2014-06-27"/>
	<bugzilla href="https://bugzilla.suse.com/627753">SUSE bug 627753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566369" comment="cabextract-1.2-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78285" version="1" class="patch">
	<metadata>
		<title>Security update for cabextract (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<description>

This security update fixes the following issues:

- Fix possible infinite loop caused DoS (bsc919283, CVE-2014-9556)
- Fix zero dereference (bsc#934524, CVE-2014-9732)
- Fix off by one (bsc#934527, CVE-2015-4470)
- Fix buffer under-read crash (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-27"/>
	<updated date="2015-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566370" comment="cabextract-1.2-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78286" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="929678" ref_url="https://bugzilla.suse.com/929678" source="BUGZILLA"/>
		<reference ref_id="931698" ref_url="https://bugzilla.suse.com/931698" source="BUGZILLA"/>
		<reference ref_id="934489" ref_url="https://bugzilla.suse.com/934489" source="BUGZILLA"/>
		<reference ref_id="934491" ref_url="https://bugzilla.suse.com/934491" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<description>

OpenSSL was updated to fix several security issues:

    * CVE-2015-4000: The Logjam Attack ( weakdh.org ) has been addressed by
      rejecting connections with DH parameters shorter than 1024 bits.
      2048-bit DH parameters are now generated by default.
    * CVE-2015-1789: An out-of-bounds read in X509_cmp_time was fixed.
    * CVE-2015-1790: A PKCS7 decoder crash with missing EnvelopedContent
      was fixed.
    * Fixed a timing side channel in RSA decryption. (bsc#929678)

Additional changes:

    * In the default SSL cipher string EXPORT ciphers are now disabled.
      This will only get active if applications get rebuilt and actually
      use this string. (bsc#931698)

Security Issues:

    * CVE-2015-1789
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789&gt;
    * CVE-2015-1790
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790&gt;
    * CVE-2015-4000
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-19"/>
	<updated date="2015-06-19"/>
	<bugzilla href="https://bugzilla.suse.com/929678">SUSE bug 929678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566371" comment="compat-openssl097g-0.9.7g-146.22.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566372" comment="compat-openssl097g-32bit-0.9.7g-146.22.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78287" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issue fixed:
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

A non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566373" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566374" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78288" version="1" class="patch">
	<metadata>
		<title>Security update for compat-wireless, compat-wireless-debuginfo, compat-wireless-debugsource, compat-wireless-kmp-default, compat-wireless-kmp-pae, compat-wireless-kmp-trace, compat-wireless-kmp-xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="851021" ref_url="https://bugzilla.suse.com/851021" source="BUGZILLA"/>
		<reference ref_id="851426" ref_url="https://bugzilla.suse.com/851426" source="BUGZILLA"/>
		<reference ref_id="865475" ref_url="https://bugzilla.suse.com/865475" source="BUGZILLA"/>
		<reference ref_id="871148" ref_url="https://bugzilla.suse.com/871148" source="BUGZILLA"/>
		<reference ref_id="883209" ref_url="https://bugzilla.suse.com/883209" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579/" source="CVE"/>
		<reference ref_id="CVE-2014-2672" ref_url="https://www.suse.com/security/cve/CVE-2014-2672/" source="CVE"/>
		<description>

This update for the compat-wireless kernel modules provides many fixes and 
enhancements:

    * Fix potential crash problem in ath9k. (CVE-2014-2672, bnc#871148)
    * Fix improper updates of MAC addresses in ath9k_htc. (bnc#851426,
      CVE-2013-4579)
    * Fix stability issues in iwlwifi. (bnc#865475)
    * Improve support for Intel 7625 cards in iwlwifi. (bnc#51021)

Installation notes:

New driver modules may conflict with old modules, which are automatically 
loaded from the initrd file after reboot. To apply this maintenance update 
correctly, the following steps need to be executed on a SLEPOS system:

    * Rebuild image
    * Create specific scDistributionContainer with newly built initrd and
      kernel
    * Put the updated system image in it as a scPosImage object

Alternatively, you can use a kernel parameter to enforce using the kernel 
from the system image:

    * Rebuild image
    * Set the kernel parameter FORCE_KEXEC, by adding the scPxeFileTemplate
      object under the relevant scPosImage object, with the
      scKernelParameters attribute containing 'FORCE_KEXEC=yes'.

Security Issue references:

    * CVE-2014-2672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672&gt;
    * CVE-2013-4579
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4579&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-18"/>
	<updated date="2014-06-18"/>
	<bugzilla href="https://bugzilla.suse.com/851021">SUSE bug 851021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851426">SUSE bug 851426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865475">SUSE bug 865475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871148">SUSE bug 871148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883209">SUSE bug 883209</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2672/">CVE-2014-2672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566375" comment="compat-wireless-kmp-default-3.13_3.0.101_0.31-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566376" comment="compat-wireless-kmp-pae-3.13_3.0.101_0.31-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566377" comment="compat-wireless-kmp-xen-3.13_3.0.101_0.31-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78289" version="1" class="patch">
	<metadata>
		<title>Security update for cpio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="907456" ref_url="https://bugzilla.suse.com/907456" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<description>

This cpio update fixes the following security issue:

    * bnc#907456: heap-based buffer overflow flaw in list_file()
      (CVE-2014-9112)

Security Issues:

    * CVE-2014-9112
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566378" comment="cpio-2.9-75.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566379" comment="cpio-lang-2.9-75.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78290" version="1" class="patch">
	<metadata>
		<title>Security update for CUPS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="887240" ref_url="https://bugzilla.suse.com/887240" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00002.html" source="SUSE-SU"/>
		<description>

This update fixes various issues in CUPS.

    * CVE-2014-3537 CVE-2014-5029 CVE-2014-5030 CVE-2014-5031: Various
      insufficient symbolic link checking could have lead to privilege
      escalation from the lp user to root.

Security Issues:

    * CVE-2014-3537
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537&gt;
    * CVE-2014-5029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029&gt;
    * CVE-2014-5030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030&gt;
    * CVE-2014-5031
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566380" comment="cups-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566381" comment="cups-client-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566382" comment="cups-libs-1.3.9-8.46.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566383" comment="cups-libs-32bit-1.3.9-8.46.52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78291" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="868627" ref_url="https://bugzilla.suse.com/868627" source="BUGZILLA"/>
		<reference ref_id="868629" ref_url="https://bugzilla.suse.com/868629" source="BUGZILLA"/>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138/" source="CVE"/>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<description>

This curl update fixes the following security issues:

    * bnc#868627: wrong re-use of connections (CVE-2014-0138).
    * bnc#868629: IP address wildcard certificate validation
      (CVE-2014-0139).
    * bnc#870444: --insecure option inappropriately enforcing security
      safeguard.

Security Issue references:

    * CVE-2014-0138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138&gt;
    * CVE-2014-0139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566384" comment="curl-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566385" comment="libcurl4-7.19.7-1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566386" comment="libcurl4-32bit-7.19.7-1.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78292" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566387" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566388" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566389" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78293" version="1" class="patch">
	<metadata>
		<title>Security update for curl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="870444" ref_url="https://bugzilla.suse.com/870444" source="BUGZILLA"/>
		<reference ref_id="884698" ref_url="https://bugzilla.suse.com/884698" source="BUGZILLA"/>
		<reference ref_id="885302" ref_url="https://bugzilla.suse.com/885302" source="BUGZILLA"/>
		<reference ref_id="894575" ref_url="https://bugzilla.suse.com/894575" source="BUGZILLA"/>
		<reference ref_id="897816" ref_url="https://bugzilla.suse.com/897816" source="BUGZILLA"/>
		<reference ref_id="901924" ref_url="https://bugzilla.suse.com/901924" source="BUGZILLA"/>
		<reference ref_id="911363" ref_url="https://bugzilla.suse.com/911363" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613/" source="CVE"/>
		<reference ref_id="CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707/" source="CVE"/>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<description>

This update fixes the following security issues:

    * 

      CVE-2014-8150: URL request injection (bnc#911363)

      When libcurl sends a request to a server via a HTTP proxy, it copies
      the entire URL into the request and sends if off.

      If the given URL contains line feeds and carriage returns those will
      be sent along to the proxy too, which allows the program to for
      example send a separate HTTP request injected embedded in the URL.

    * 

      CVE-2014-3707: duphandle read out of bounds (bnc#901924)

    * 

      CVE-2014-3613: libcurl cookie leaks (bnc#894575)

Additional bug fixed:

    * curl_multi_remove_handle: don't crash on multiple removes
      (bnc#897816)

Security Issues:

    * CVE-2014-8150
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150&gt;
    * CVE-2014-3613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613&gt;
    * CVE-2014-3707
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-13"/>
	<updated date="2015-01-13"/>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884698">SUSE bug 884698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885302">SUSE bug 885302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897816">SUSE bug 897816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566390" comment="curl-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566391" comment="libcurl4-7.19.7-1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566392" comment="libcurl4-32bit-7.19.7-1.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78294" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="896453" ref_url="https://bugzilla.suse.com/896453" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638/" source="CVE"/>
		<description>

Various denial of service issues were fixed in the DBUS service.

    * CVE-2014-3638: dbus-daemon tracks whether method call messages expect
      a reply, so that unsolicited replies can be dropped. As currently
      implemented, if there are n parallel method calls in progress, each
      method reply takes O(n) CPU time. A malicious user could exploit this
      by opening the maximum allowed number of parallel connections and
      sending the maximum number of parallel method calls on each one,
      causing subsequent method calls to be unreasonably slow, a denial of
      service.
    * CVE-2014-3639: dbus-daemon allows a small number of 'incomplete'
      connections (64 by default) whose identity has not yet been
      confirmed. When this limit has been reached, subsequent connections
      are dropped. Alban's testing indicates that one malicious process
      that makes repeated connection attempts, but never completes the
      authentication handshake and instead waits for dbus-daemon to time
      out and disconnect it, can cause the majority of legitimate
      connection attempts to fail.

Security Issues:

    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;
    * CVE-2014-3638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-16"/>
	<updated date="2014-09-16"/>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566393" comment="dbus-1-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566394" comment="dbus-1-32bit-1.2.10-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566395" comment="dbus-1-x11-1.2.10-3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78295" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566396" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566397" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78296" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00002.html" source="SUSE-SU"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566398" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78297" version="1" class="patch">
	<metadata>
		<title>Security update for e2fsprogs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="915402" ref_url="https://bugzilla.suse.com/915402" source="BUGZILLA"/>
		<reference ref_id="918346" ref_url="https://bugzilla.suse.com/918346" source="BUGZILLA"/>
		<reference ref_id="932539" ref_url="https://bugzilla.suse.com/932539" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<description>

Two security issues were fixed in e2fsprogs:

    * CVE-2015-0247: Various heap overflows were fixed in e2fsprogs (fsck,
      dumpe2fs, e2image).
    * CVE-2015-1572: Fixed a potential buffer overflow in closefs().
      (bsc#918346)

Additionally, badblocks was enhanced to work with very large partitions. 
(bsc#932539)

Security Issues:

    * CVE-2015-0247
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247&gt;
    * CVE-2015-1572
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-26"/>
	<updated date="2015-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932539">SUSE bug 932539</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566399" comment="e2fsprogs-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566400" comment="libblkid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009440332" comment="libblkid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566401" comment="libcom_err2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566402" comment="libcom_err2-32bit-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566403" comment="libext2fs2-1.41.9-2.10.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566404" comment="libuuid-devel-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566405" comment="libuuid1-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009440334" comment="libuuid1-32bit-2.19.1-6.62.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566406" comment="uuid-runtime-2.19.1-6.62.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78298" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-30"/>
	<updated date="2016-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566407" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566408" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78299" version="1" class="patch">
	<metadata>
		<title>Security update for elfutils</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="911662" ref_url="https://bugzilla.suse.com/911662" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001269.html" source="SUSE-SU"/>
		<description>

elfutils has been updated to fix one security issue:

    * CVE-2014-9447: Directory traversal vulnerability in the
      read_long_names function in libelf/elf_begin.c in elfutils 0.152 and
      0.161 allowed remote attackers to write to arbitrary files to the
      root directory via a / (slash) in a crafted archive, as demonstrated
      using the ar program (bnc#911662).

Security Issues:

    * CVE-2014-9447
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-18"/>
	<updated date="2015-02-18"/>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566409" comment="elfutils-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566410" comment="libasm1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566411" comment="libdw1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566412" comment="libdw1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566413" comment="libebl1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566414" comment="libebl1-32bit-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566415" comment="libelf1-0.152-4.9.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563274" comment="libelf1-32bit-0.152-4.9.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78300" version="1" class="patch">
	<metadata>
		<title>Security update for emacs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="854683" ref_url="https://bugzilla.suse.com/854683" source="BUGZILLA"/>
		<reference ref_id="876847" ref_url="https://bugzilla.suse.com/876847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<description>

Emacs has been updated to fix the following issues:

    * Several cases of insecure usage of temporary files. (CVE-2014-3421,
      CVE-2014-3422, CVE-2014-3423, CVE-2014-3424)
    * Use of vc-annotate for renamed files when using Git. (bnc#854683)

Security Issues:

    * CVE-2014-3421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421&gt;
    * CVE-2014-3422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422&gt;
    * CVE-2014-3423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423&gt;
    * CVE-2014-3424
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-23"/>
	<updated date="2015-03-23"/>
	<bugzilla href="https://bugzilla.suse.com/854683">SUSE bug 854683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566416" comment="emacs-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566417" comment="emacs-info-22.3-4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566418" comment="emacs-x11-22.3-4.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78301" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="901553" ref_url="https://bugzilla.suse.com/901553" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

evolution-data-server has been updated to disable support for SSLv3.

This security issues has been fixed:

    * SSLv3 POODLE attack (CVE-2014-3566)

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/901553">SUSE bug 901553</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566419" comment="evolution-data-server-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566420" comment="evolution-data-server-32bit-2.28.2-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566421" comment="evolution-data-server-lang-2.28.2-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78302" version="1" class="patch">
	<metadata>
		<title>Security update for file</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="902367" ref_url="https://bugzilla.suse.com/902367" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<description>

file was updated to fix one security issue.

    * An out-of-bounds read flaw file's donote() function. This could
      possibly lead to file executable crash (CVE-2014-3710).

Security Issues:

    * CVE-2014-3710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-18"/>
	<updated date="2014-11-18"/>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566422" comment="file-4.24-43.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566423" comment="file-32bit-4.24-43.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78303" version="1" class="patch">
	<metadata>
		<title>Security update for finch</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="861019" ref_url="https://bugzilla.suse.com/861019" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6152" ref_url="https://www.suse.com/security/cve/CVE-2012-6152/" source="CVE"/>
		<reference ref_id="CVE-2013-6477" ref_url="https://www.suse.com/security/cve/CVE-2013-6477/" source="CVE"/>
		<reference ref_id="CVE-2013-6478" ref_url="https://www.suse.com/security/cve/CVE-2013-6478/" source="CVE"/>
		<reference ref_id="CVE-2013-6479" ref_url="https://www.suse.com/security/cve/CVE-2013-6479/" source="CVE"/>
		<reference ref_id="CVE-2013-6481" ref_url="https://www.suse.com/security/cve/CVE-2013-6481/" source="CVE"/>
		<reference ref_id="CVE-2013-6482" ref_url="https://www.suse.com/security/cve/CVE-2013-6482/" source="CVE"/>
		<reference ref_id="CVE-2013-6483" ref_url="https://www.suse.com/security/cve/CVE-2013-6483/" source="CVE"/>
		<reference ref_id="CVE-2013-6484" ref_url="https://www.suse.com/security/cve/CVE-2013-6484/" source="CVE"/>
		<reference ref_id="CVE-2013-6485" ref_url="https://www.suse.com/security/cve/CVE-2013-6485/" source="CVE"/>
		<reference ref_id="CVE-2013-6486" ref_url="https://www.suse.com/security/cve/CVE-2013-6486/" source="CVE"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2013-6489" ref_url="https://www.suse.com/security/cve/CVE-2013-6489/" source="CVE"/>
		<reference ref_id="CVE-2013-6490" ref_url="https://www.suse.com/security/cve/CVE-2013-6490/" source="CVE"/>
		<reference ref_id="CVE-2014-0020" ref_url="https://www.suse.com/security/cve/CVE-2014-0020/" source="CVE"/>
		<description>

The pidgin Instant Messenger has been updated to fix various security 
issues:

    * CVE-2014-0020: Remotely triggerable crash in IRC argument parsing
    * CVE-2013-6490: Buffer overflow in SIMPLE header parsing
    * CVE-2013-6489: Buffer overflow in MXit emoticon parsing
    * CVE-2013-6487: Buffer overflow in Gadu-Gadu HTTP parsing
    * CVE-2013-6486: Pidgin uses clickable links to untrusted executables
    * CVE-2013-6485: Buffer overflow parsing chunked HTTP responses
    * CVE-2013-6484: Crash reading response from STUN server
    * CVE-2013-6483: XMPP doesn't verify 'from' on some iq replies
    * CVE-2013-6482: NULL pointer dereference parsing SOAP data in MSN
    * CVE-2013-6482: NULL pointer dereference parsing OIM data in MSN
    * CVE-2013-6482: NULL pointer dereference parsing headers in MSN
    * CVE-2013-6481: Remote crash reading Yahoo! P2P message
    * CVE-2013-6479: Remote crash parsing HTTP responses
    * CVE-2013-6478: Crash when hovering pointer over a long URL
    * CVE-2013-6477: Crash handling bad XMPP timestamp
    * CVE-2012-6152: Yahoo! remote crash from incorrect character encoding

Security Issue references:

    * CVE-2014-0020
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020&gt;
    * CVE-2013-6490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490&gt;
    * CVE-2013-6489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489&gt;
    * CVE-2013-6487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487&gt;
    * CVE-2013-6486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486&gt;
    * CVE-2013-6485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485&gt;
    * CVE-2013-6484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484&gt;
    * CVE-2013-6483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483&gt;
    * CVE-2013-6482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482&gt;
    * CVE-2013-6481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481&gt;
    * CVE-2013-6479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479&gt;
    * CVE-2013-6478
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478&gt;
    * CVE-2013-6477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477&gt;
    * CVE-2012-6152
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-08"/>
	<updated date="2014-05-08"/>
	<bugzilla href="https://bugzilla.suse.com/861019">SUSE bug 861019</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6152/">CVE-2012-6152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6477/">CVE-2013-6477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6478/">CVE-2013-6478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6479/">CVE-2013-6479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6481/">CVE-2013-6481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6482/">CVE-2013-6482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6483/">CVE-2013-6483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6484/">CVE-2013-6484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6485/">CVE-2013-6485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6486/">CVE-2013-6486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6489/">CVE-2013-6489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6490/">CVE-2013-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0020/">CVE-2014-0020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566424" comment="finch-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566425" comment="libpurple-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566426" comment="libpurple-lang-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566427" comment="libpurple-meanwhile-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566428" comment="libpurple-tcl-2.6.6-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566429" comment="pidgin-2.6.6-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78304" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="792432" ref_url="https://bugzilla.suse.com/792432" source="BUGZILLA"/>
		<reference ref_id="813026" ref_url="https://bugzilla.suse.com/813026" source="BUGZILLA"/>
		<reference ref_id="819204" ref_url="https://bugzilla.suse.com/819204" source="BUGZILLA"/>
		<reference ref_id="825935" ref_url="https://bugzilla.suse.com/825935" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682/" source="CVE"/>
		<reference ref_id="CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684/" source="CVE"/>
		<reference ref_id="CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685/" source="CVE"/>
		<reference ref_id="CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686/" source="CVE"/>
		<reference ref_id="CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687/" source="CVE"/>
		<reference ref_id="CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690/" source="CVE"/>
		<reference ref_id="CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692/" source="CVE"/>
		<reference ref_id="CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693/" source="CVE"/>
		<reference ref_id="CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.7 ESR version, which fixes 
bugs and security fixes.

    * 

      MFSA 2013-49: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Gary Kwong, Jesse Ruderman, and Andrew McCreight reported memory
      safety problems and crashes that affect Firefox ESR 17, and Firefox
      21. (CVE-2013-1682)

    * 

      MFSA 2013-50: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free problems rated critical as
      security issues in shipped software. Some of these issues are
      potentially exploitable, allowing for remote code execution. We would
      also like to thank Abhishek for reporting additional use-after-free
      and buffer overflow flaws in code introduced during Firefox
      development. These were fixed before general release.

          o Heap-use-after-free in
            mozilla::dom::HTMLMediaElement::LookupMediaElementURITable
            (CVE-2013-1684)
          o Heap-use-after-free in nsIDocument::GetRootElement
            (CVE-2013-1685)
          o Heap-use-after-free in mozilla::ResetDir (CVE-2013-1686)
    * 

      MFSA 2013-51 / CVE-2013-1687: Security researcher Mariusz Mlynski
      reported that it is possible to compile a user-defined function in
      the XBL scope of a specific element and then trigger an event within
      this scope to run code. In some circumstances, when this code is run,
      it can access content protected by System Only Wrappers (SOW) and
      chrome-privileged pages. This could potentially lead to arbitrary
      code execution. Additionally, Chrome Object Wrappers (COW) can be
      bypassed by web content to access privileged methods, leading to a
      cross-site scripting (XSS) attack from privileged pages.

    * 

      MFSA 2013-53 / CVE-2013-1690: Security researcher Nils reported that
      specially crafted web content using the onreadystatechange event and
      reloading of pages could sometimes cause a crash when unmapped memory
      is executed. This crash is potentially exploitable.

    * 

      MFSA 2013-54 / CVE-2013-1692: Security researcher Johnathan Kuskos
      reported that Firefox is sending data in the body of XMLHttpRequest
      (XHR) HEAD requests, which goes agains the XHR specification. This
      can potentially be used for Cross-Site Request Forgery (CSRF) attacks
      against sites which do not distinguish between HEAD and POST
      requests.

    * 

      MFSA 2013-55 / CVE-2013-1693: Security researcher Paul Stone of
      Context Information Security discovered that timing differences in
      the processing of SVG format images with filters could allow for
      pixel values to be read. This could potentially allow for text values
      to be read across domains, leading to information disclosure.

    * 

      MFSA 2013-59 / CVE-2013-1697: Mozilla security researcher
      moz_bug_r_a4 reported that XrayWrappers can be bypassed to call
      content-defined toString and valueOf methods through DefaultValue.
      This can lead to unexpected behavior when privileged code acts on the
      incorrect values.

    * 

      MFSA 2013-30: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Olli Pettay, Jesse Ruderman, Boris Zbarsky, Christian Holler, Milan
      Sreckovic, and Joe Drew reported memory safety problems and crashes
      that affect Firefox ESR 17, and Firefox 19. (CVE-2013-0788)

    * 

      MFSA 2013-31 / CVE-2013-0800: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an out-of-bounds write in Cairo graphics
      library. When certain values are passed to it during rendering, Cairo
      attempts to use negative boundaries or sizes for boxes, leading to a
      potentially exploitable crash in some instances.

    * 

      MFSA 2013-32 / CVE-2013-0799: Security researcher Frederic Hoguin
      discovered that the Mozilla Maintenance Service on Windows was
      vulnerable to a buffer overflow. This system is used to update
      software without invoking the User Account Control (UAC) prompt. The
      Mozilla Maintenance Service is configured to allow unprivileged users
      to start it with arbitrary arguments. By manipulating the data passed
      in these arguments, an attacker can execute arbitrary code with the
      system privileges used by the service. This issue requires local file
      system access to be exploitable.

    * 

      MFSA 2013-34 / CVE-2013-0797: Security researcher Ash reported an
      issue with the Mozilla Updater. The Mozilla Updater can be made to
      load a malicious local DLL file in a privileged context through
      either the Mozilla Maintenance Service or independently on systems
      that do not use the service. This occurs when the DLL file is placed
      in a specific location on the local system before the Mozilla Updater
      is run. Local file system access is necessary in order for this issue
      to be exploitable.

    * 

      MFSA 2013-35 / CVE-2013-0796: Security researcher miaubiz used the
      Address Sanitizer tool to discover a crash in WebGL rendering when
      memory is freed that has not previously been allocated. This issue
      only affects Linux users who have Intel Mesa graphics drivers. The
      resulting crash could be potentially exploitable.

    * 

      MFSA 2013-36 / CVE-2013-0795: Security researcher Cody Crews reported
      a mechanism to use the cloneNode method to bypass System Only
      Wrappers (SOW) and clone a protected node. This allows violation of
      the browser's same origin policy and could also lead to privilege
      escalation and the execution of arbitrary code.

    * 

      MFSA 2013-37 / CVE-2013-0794: Security researcher shutdown reported a
      method for removing the origin indication on tab-modal dialog boxes
      in combination with browser navigation. This could allow an
      attacker's dialog to overlay a page and show another site's content.
      This can be used for phishing by allowing users to enter data into a
      modal prompt dialog on an attacking, site while appearing to be from
      the displayed site.

    * 

      MFSA 2013-38 / CVE-2013-0793: Security researcher Mariusz Mlynski
      reported a method to use browser navigations through history to load
      an arbitrary website with that page's baseURI property pointing to
      another site instead of the seemingly loaded one. The user will
      continue to see the incorrect site in the addressbar of the browser.
      This allows for a cross-site scripting (XSS) attack or the theft of
      data through a phishing attack.

    * 

      MFSA 2013-39 / CVE-2013-0792: Mozilla community member Tobias Schula
      reported that if gfx.color_management.enablev4 preference is enabled
      manually in about:config, some grayscale PNG images will be rendered
      incorrectly and cause memory corruption during PNG decoding when
      certain color profiles are in use. A crafted PNG image could use this
      flaw to leak data through rendered images drawing from random memory.
      By default, this preference is not enabled.

    * 

      MFSA 2013-40 / CVE-2013-0791: Mozilla community member Ambroz Bizjak
      reported an out-of-bounds array read in the CERT_DecodeCertPackage
      function of the Network Security Services (NSS) libary when decoding
      a certificate. When this occurs, it will lead to memory corruption
      and a non-exploitable crash.

    * 

      MFSA 2013-41: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      References

          o Christoph Diehl, Christian Holler, Jesse Ruderman, Timothy
            Nikkel, and Jeff Walden reported memory safety problems and
            crashes that affect Firefox ESR 17, and Firefox 20.
          o Bob Clary, Ben Turner, Benoit Jacob, Bobby Holley, Christoph
            Diehl, Christian Holler, Andrew McCreight, Gary Kwong, Jason
            Orendorff, Jesse Ruderman, Matt Wobensmith, and Mats Palmgren
            reported memory safety problems and crashes that affect Firefox
            20.
    * 

      MFSA 2013-42 / CVE-2013-1670: Security researcher Cody Crews reported
      a method to call a content level constructor that allows for this
      constructor to have chrome privileged accesss. This affects chrome
      object wrappers (COW) and allows for write actions on objects when
      only read actions should be allowed. This can lead to cross-site
      scripting (XSS) attacks.

    * 

      MFSA 2013-43 / CVE-2013-1671: Mozilla security researcher
      moz_bug_r_a4 reported a mechanism to exploit the control when set to
      the file type in order to get the full path. This can lead to
      information leakage and could be combined with other exploits to
      target attacks on the local file system.

    * 

      MFSA 2013-44 / CVE-2013-1672: Security researcher Seb Patane reported
      an issue with the Mozilla Maintenance Service on Windows. This issue
      allows unprivileged users to local privilege escalation through the
      system privileges used by the service when interacting with local
      malicious software. This allows the user to bypass integrity checks
      leading to local privilege escalation. Local file system access is
      necessary in order for this issue to be exploitable and it cannot be
      triggered through web content.

    * 

      MFSA 2013-45: Security researcher Robert Kugler discovered that in
      some instances the Mozilla Maintenance Service on Windows will be
      vulnerable to some previously fixed privilege escalation attacks that
      allowed for local privilege escalation. This was caused by the
      Mozilla Updater not updating Windows Registry entries for the Mozilla
      Maintenance Service, which fixed the earlier issues present if
      Firefox 12 had been installed. New installations of Firefox after
      version 12 are not affected by this issue. Local file system access
      is necessary in order for this issue to be exploitable and it cannot
      be triggered through web content. References: - old
      MozillaMaintenance Service registry entry not updated leading to
      Trusted Path Privilege Escalation (CVE-2013-1673) - Possible
      Arbitrary Code Execution by Update Service (CVE-2012-1942)

    * 

      MFSA 2013-46 / CVE-2013-1674: Security researcher Nils reported a
      use-after-free when resizing video while playing. This could allow
      for arbitrary code execution.

    * 

      MFSA 2013-47 / CVE-2013-1675: Mozilla community member Ms2ger
      discovered that some DOMSVGZoomEvent functions are used without being
      properly initialized, causing uninitialized memory to be used when
      they are called by web content. This could lead to a information
      leakage to sites depending on the contents of this uninitialized
      memory.

    * 

      MFSA 2013-48: Security researcher Abhishek Arya (Inferno) of the
      Google Chrome Security Team used the Address Sanitizer tool to
      discover a series of use-after-free, out of bounds read, and invalid
      write problems rated as moderate to critical as security issues in
      shipped software. Some of these issues are potentially exploitable,
      allowing for remote code execution. We would also like to thank
      Abhishek for reporting additional use-after-free flaws in dir=auto
      code introduced during Firefox development. These were fixed before
      general release.

      References

          o Out of Bounds Read in SelectionIterator::GetNextSegment
            (CVE-2013-1676)
          o Out-of-bound read in gfxSkipCharsIterator::SetOffsets
            (CVE-2013-1677))
          o Invalid write in _cairo_xlib_surface_add_glyph (CVE-2013-1678)
          o Heap-use-after-free in mozilla::plugins::child::_geturlnotify
            (CVE-2013-1679)
          o Heap-use-after-free in nsFrameList::FirstChild (CVE-2013-1680)
          o Heap-use-after-free in nsContentUtils::RemoveScriptBlocker
            (CVE-2013-1681)
    * 

      CVE-2012-1942
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1942&gt;

    * CVE-2013-0788
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788&gt;
    * CVE-2013-0791
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791&gt;
    * CVE-2013-0792
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792&gt;
    * CVE-2013-0793
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793&gt;
    * CVE-2013-0794
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794&gt;
    * CVE-2013-0795
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795&gt;
    * CVE-2013-0796
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796&gt;
    * CVE-2013-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797&gt;
    * CVE-2013-0798
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798&gt;
    * CVE-2013-0799
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799&gt;
    * CVE-2013-0800
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800&gt;
    * CVE-2013-0801
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801&gt;
    * CVE-2013-1669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669&gt;
    * CVE-2013-1670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670&gt;
    * CVE-2013-1671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671&gt;
    * CVE-2013-1672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1672&gt;
    * CVE-2013-1673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1673&gt;
    * CVE-2013-1674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674&gt;
    * CVE-2013-1675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675&gt;
    * CVE-2013-1676
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676&gt;
    * CVE-2013-1677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677&gt;
    * CVE-2013-1678
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678&gt;
    * CVE-2013-1679
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679&gt;
    * CVE-2013-1680
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680&gt;
    * CVE-2013-1681
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681&gt;
    * CVE-2013-1682
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682&gt;
    * CVE-2013-1684
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684&gt;
    * CVE-2013-1685
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685&gt;
    * CVE-2013-1686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686&gt;
    * CVE-2013-1687
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687&gt;
    * CVE-2013-1690
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690&gt;
    * CVE-2013-1692
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692&gt;
    * CVE-2013-1693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693&gt;
    * CVE-2013-1697
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-02"/>
	<updated date="2013-07-02"/>
	<bugzilla href="https://bugzilla.suse.com/792432">SUSE bug 792432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566430" comment="MozillaFirefox-17.0.7esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566431" comment="MozillaFirefox-branding-SLED-7-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566432" comment="MozillaFirefox-translations-17.0.7esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78305" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 17.0.10ESR release, which fixes 
various bugs and security issues:

    * 

      MFSA 2013-93: Mozilla developers identified and fixed several memory
      safety bugs in the browser engine used in Firefox and other
      Mozilla-based products. Some of these bugs showed evidence of memory
      corruption under certain circumstances, and we presume that with
      enough effort at least some of these could be exploited to run
      arbitrary code.

      Jesse Ruderman and Christoph Diehl reported memory safety problems
      and crashes that affect Firefox ESR 17, Firefox ESR 24, and Firefox
      24. (CVE-2013-5590)

      Carsten Book reported a crash fixed in the NSS library used by
      Mozilla-based products fixed in Firefox 25, Firefox ESR 24.1, and
      Firefox ESR 17.0.10.(CVE-2013-1739)

    * 

      MFSA 2013-95 / CVE-2013-5604: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover an access violation due to uninitialized
      data during Extensible Stylesheet Language Transformation (XSLT)
      processing. This leads to a potentially exploitable crash.

    * 

      MFSA 2013-96 / CVE-2013-5595: Compiler Engineer Dan Gohman of Google
      discovered a flaw in the JavaScript engine where memory was being
      incorrectly allocated for some functions and the calls for
      allocations were not always properly checked for overflow, leading to
      potential buffer overflows. When combined with other vulnerabilities,
      these flaws could be potentially exploitable.

    * 

      MFSA 2013-98 / CVE-2013-5597: Security researcher Byoungyoung Lee of
      Georgia Tech Information Security Center (GTISC) used the Address
      Sanitizer tool to discover a use-after-free during state change
      events while updating the offline cache. This leads to a potentially
      exploitable crash.

    * 

      MFSA 2013-100: Security researcher Nils used the Address Sanitizer
      tool while fuzzing to discover missing strong references in browsing
      engine leading to use-after-frees. This can lead to a potentially
      exploitable crash.

          o ASAN heap-use-after-free in nsIPresShell::GetPresContext() with
            canvas, onresize and mozTextStyle (CVE-2013-5599)
          o ASAN use-after-free in
            nsIOService::NewChannelFromURIWithProxyFlags with Blob URL
            (CVE-2013-5600)
          o ASAN use-after free in GC allocation in
            nsEventListenerManager::SetEventHandler (CVE-2013-5601)
    * 

      MFSA 2013-101 / CVE-2013-5602: Security researcher Nils used the
      Address Sanitizer tool while fuzzing to discover a memory corruption
      issue with the JavaScript engine when using workers with direct
      proxies. This results in a potentially exploitable crash.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566433" comment="MozillaFirefox-17.0.10esr-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566434" comment="MozillaFirefox-branding-SLED-7-0.12.41 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566435" comment="MozillaFirefox-translations-17.0.10esr-0.7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78306" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="859055" ref_url="https://bugzilla.suse.com/859055" source="BUGZILLA"/>
		<reference ref_id="861847" ref_url="https://bugzilla.suse.com/861847" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477/" source="CVE"/>
		<reference ref_id="CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479/" source="CVE"/>
		<reference ref_id="CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480/" source="CVE"/>
		<reference ref_id="CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481/" source="CVE"/>
		<reference ref_id="CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482/" source="CVE"/>
		<reference ref_id="CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483/" source="CVE"/>
		<reference ref_id="CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484/" source="CVE"/>
		<reference ref_id="CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485/" source="CVE"/>
		<reference ref_id="CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486/" source="CVE"/>
		<reference ref_id="CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487/" source="CVE"/>
		<reference ref_id="CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488/" source="CVE"/>
		<reference ref_id="CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489/" source="CVE"/>
		<reference ref_id="CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490/" source="CVE"/>
		<reference ref_id="CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491/" source="CVE"/>
		<description>

This updates the Mozilla Firefox browser to the 24.3.0ESR security release. 
The Mozilla NSS libraries are now on version 3.15.4.

The following security issues have been fixed:

    * 

      MFSA 2014-01: Memory safety bugs fixed in Firefox ESR 24.3 and
      Firefox 27.0 (CVE-2014-1477)(bnc#862345)

    * 

      MFSA 2014-02: Using XBL scopes its possible to steal(clone) native
      anonymous content (CVE-2014-1479)(bnc#862348)

    * 

      MFSA 2014-03: Download 'open file' dialog delay is too quick, doesn't
      prevent clickjacking (CVE-2014-1480)

    * 

      MFSA 2014-04: Image decoding causing FireFox to crash with Goo Create
      (CVE-2014-1482)(bnc#862356)

    * 

      MFSA 2014-05: caretPositionFromPoint and elementFromPoint leak
      information about iframe contents via timing information
      (CVE-2014-1483)(bnc#862360)

    * 

      MFSA 2014-06: Fennec leaks profile path to logcat (CVE-2014-1484)

    * 

      MFSA 2014-07: CSP should block XSLT as script, not as style
      (CVE-2014-1485)

    * 

      MFSA 2014-08: imgRequestProxy Use-After-Free Remote Code Execution
      Vulnerability (CVE-2014-1486)

    * 

      MFSA 2014-09: Cross-origin information disclosure with error message
      of Web Workers (CVE-2014-1487)

    * 

      MFSA 2014-10: settings &amp; history ID bug (CVE-2014-1489)

    * 

      MFSA 2014-11: Firefox reproducibly crashes when using asm.js code in
      workers and transferable objects (CVE-2014-1488)

    * 

      MFSA 2014-12: TOCTOU, potential use-after-free in libssl's session
      ticket processing (CVE-2014-1490)(bnc#862300) Do not allow p-1 as a
      public DH value (CVE-2014-1491)(bnc#862289)

    * 

      MFSA 2014-13: Inconsistent this value when invoking getters on window
      (CVE-2014-1481)(bnc#862309)

Security Issue references:

    * CVE-2014-1477
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477&gt;
    * CVE-2014-1479
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479&gt;
    * CVE-2014-1480
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480&gt;
    * CVE-2014-1481
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481&gt;
    * CVE-2014-1482
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482&gt;
    * CVE-2014-1483
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483&gt;
    * CVE-2014-1484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484&gt;
    * CVE-2014-1485
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485&gt;
    * CVE-2014-1486
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486&gt;
    * CVE-2014-1487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487&gt;
    * CVE-2014-1488
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488&gt;
    * CVE-2014-1489
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489&gt;
    * CVE-2014-1490
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490&gt;
    * CVE-2014-1491
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-07"/>
	<updated date="2014-02-07"/>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566436" comment="MozillaFirefox-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566437" comment="MozillaFirefox-branding-SLED-24-0.7.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566438" comment="MozillaFirefox-translations-24.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566439" comment="libfreebl3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566440" comment="libfreebl3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566441" comment="libsoftokn3-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566442" comment="libsoftokn3-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566443" comment="mozilla-nss-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566444" comment="mozilla-nss-32bit-3.15.4-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566445" comment="mozilla-nss-tools-3.15.4-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78307" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="868603" ref_url="https://bugzilla.suse.com/868603" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1493" ref_url="https://www.suse.com/security/cve/CVE-2014-1493/" source="CVE"/>
		<reference ref_id="CVE-2014-1494" ref_url="https://www.suse.com/security/cve/CVE-2014-1494/" source="CVE"/>
		<reference ref_id="CVE-2014-1496" ref_url="https://www.suse.com/security/cve/CVE-2014-1496/" source="CVE"/>
		<reference ref_id="CVE-2014-1497" ref_url="https://www.suse.com/security/cve/CVE-2014-1497/" source="CVE"/>
		<reference ref_id="CVE-2014-1498" ref_url="https://www.suse.com/security/cve/CVE-2014-1498/" source="CVE"/>
		<reference ref_id="CVE-2014-1499" ref_url="https://www.suse.com/security/cve/CVE-2014-1499/" source="CVE"/>
		<reference ref_id="CVE-2014-1500" ref_url="https://www.suse.com/security/cve/CVE-2014-1500/" source="CVE"/>
		<reference ref_id="CVE-2014-1501" ref_url="https://www.suse.com/security/cve/CVE-2014-1501/" source="CVE"/>
		<reference ref_id="CVE-2014-1502" ref_url="https://www.suse.com/security/cve/CVE-2014-1502/" source="CVE"/>
		<reference ref_id="CVE-2014-1504" ref_url="https://www.suse.com/security/cve/CVE-2014-1504/" source="CVE"/>
		<reference ref_id="CVE-2014-1505" ref_url="https://www.suse.com/security/cve/CVE-2014-1505/" source="CVE"/>
		<reference ref_id="CVE-2014-1508" ref_url="https://www.suse.com/security/cve/CVE-2014-1508/" source="CVE"/>
		<reference ref_id="CVE-2014-1509" ref_url="https://www.suse.com/security/cve/CVE-2014-1509/" source="CVE"/>
		<reference ref_id="CVE-2014-1510" ref_url="https://www.suse.com/security/cve/CVE-2014-1510/" source="CVE"/>
		<reference ref_id="CVE-2014-1511" ref_url="https://www.suse.com/security/cve/CVE-2014-1511/" source="CVE"/>
		<reference ref_id="CVE-2014-1512" ref_url="https://www.suse.com/security/cve/CVE-2014-1512/" source="CVE"/>
		<reference ref_id="CVE-2014-1513" ref_url="https://www.suse.com/security/cve/CVE-2014-1513/" source="CVE"/>
		<reference ref_id="CVE-2014-1514" ref_url="https://www.suse.com/security/cve/CVE-2014-1514/" source="CVE"/>
		<description>

Mozilla Firefox was updated to 24.4.0ESR release, fixing various security 
issues and bugs:

    * 

      MFSA 2014-15: Mozilla developers and community identified identified
      and fixed several memory safety bugs in the browser engine used in
      Firefox and other Mozilla-based products. Some of these bugs showed
      evidence of memory corruption under certain circumstances, and we
      presume that with enough effort at least some of these could be
      exploited to run arbitrary code.

    * 

      Benoit Jacob, Olli Pettay, Jan Varga, Jan de Mooij, Jesse Ruderman,
      Dan Gohman, and Christoph Diehl reported memory safety problems and
      crashes that affect Firefox ESR 24.3 and Firefox 27. (CVE-2014-1493)

    * 

      Gregor Wagner, Olli Pettay, Gary Kwong, Jesse Ruderman, Luke Wagner,
      Rob Fletcher, and Makoto Kato reported memory safety problems and
      crashes that affect Firefox 27. (CVE-2014-1494)

    * 

      MFSA 2014-16 / CVE-2014-1496: Security researcher Ash reported an
      issue where the extracted files for updates to existing files are not
      read only during the update process. This allows for the potential
      replacement or modification of these files during the update process
      if a malicious application is present on the local system.

    * 

      MFSA 2014-17 / CVE-2014-1497: Security researcher Atte Kettunen from
      OUSPG reported an out of bounds read during the decoding of WAV
      format audio files for playback. This could allow web content access
      to heap data as well as causing a crash.

    * 

      MFSA 2014-18 / CVE-2014-1498: Mozilla developer David Keeler reported
      that the crypto.generateCRFMRequest method did not correctly validate
      the key type of the KeyParams argument when generating ec-dual-use
      requests. This could lead to a crash and a denial of service (DOS)
      attack.

    * 

      MFSA 2014-19 / CVE-2014-1499: Mozilla developer Ehsan Akhgari
      reported a spoofing attack where the permission prompt for a WebRTC
      session can appear to be from a different site than its actual
      originating site if a timed navigation occurs during the prompt
      generation. This allows an attacker to potentially gain access to the
      webcam or microphone by masquerading as another site and gaining user
      permission through spoofing.

    * 

      MFSA 2014-20 / CVE-2014-1500: Security researchers Tim Philipp
      Schaefers and Sebastian Neef, the team of Internetwache.org, reported
      a mechanism using JavaScript onbeforeunload events with page
      navigation to prevent users from closing a malicious page's tab and
      causing the browser to become unresponsive. This allows for a denial
      of service (DOS) attack due to resource consumption and blocks the
      ability of users to exit the application.

    * 

      MFSA 2014-21 / CVE-2014-1501: Security researcher Alex Infuehr
      reported that on Firefox for Android it is possible to open links to
      local files from web content by selecting 'Open Link in New Tab' from
      the context menu using the file: protocol. The web content would have
      to know the precise location of a malicious local file in order to
      exploit this issue. This issue does not affect Firefox on non-Android
      systems.

    * 

      MFSA 2014-22 / CVE-2014-1502: Mozilla developer Jeff Gilbert
      discovered a mechanism where a malicious site with WebGL content
      could inject content from its context to that of another site's WebGL
      context, causing the second site to replace textures and similar
      content. This cannot be used to steal data but could be used to
      render arbitrary content in these limited circumstances.

    * 

      MFSA 2014-23 / CVE-2014-1504: Security researcher Nicolas Golubovic
      reported that the Content Security Policy (CSP) of data: documents
      was not saved as part of session restore. If an attacker convinced a
      victim to open a document from a data: URL injected onto a page, this
      can lead to a Cross-Site Scripting (XSS) attack. The target page may
      have a strict CSP that protects against this XSS attack, but if the
      attacker induces a browser crash with another bug, an XSS attack
      would occur during session restoration, bypassing the CSP on the
      site.

    * 

      MFSA 2014-26 / CVE-2014-1508: Security researcher Tyson Smith and
      Jesse Schwartzentruber of the BlackBerry Security Automated Analysis
      Team used the Address Sanitizer tool while fuzzing to discover an
      out-of-bounds read during polygon rendering in MathML. This can allow
      web content to potentially read protected memory addresses. In
      combination with previous techniques used for SVG timing attacks,
      this could allow for text values to be read across domains, leading
      to information disclosure.

    * 

      MFSA 2014-27 / CVE-2014-1509: Security researcher John Thomson
      discovered a memory corruption in the Cairo graphics library during
      font rendering of a PDF file for display. This memory corruption
      leads to a potentially exploitable crash and to a denial of service
      (DOS). This issues is not able to be triggered in a default
      configuration and would require a malicious extension to be
      installed.

    * 

      MFSA 2014-28 / CVE-2014-1505: Mozilla developer Robert O'Callahan
      reported a mechanism for timing attacks involving SVG filters and
      displacements input to feDisplacementMap. This allows displacements
      to potentially be correlated with values derived from content. This
      is similar to the previously reported techniques used for SVG timing
      attacks and could allow for text values to be read across domains,
      leading to information disclosure.

    * 

      MFSA 2014-29 / CVE-2014-1510 / CVE-2014-1511: Security researcher
      Mariusz Mlynski, via TippingPoint's Pwn2Own contest, reported that it
      is possible for untrusted web content to load a chrome-privileged
      page by getting JavaScript-implemented WebIDL to call window.open().
      A second bug allowed the bypassing of the popup-blocker without user
      interaction. Combined these two bugs allow an attacker to load a
      JavaScript URL that is executed with the full privileges of the
      browser, which allows arbitrary code execution.

    * 

      MFSA 2014-30 / CVE-2014-1512: Security research firm VUPEN, via
      TippingPoint's Pwn2Own contest, reported that memory pressure during
      Garbage Collection could lead to memory corruption of TypeObjects in
      the JS engine, resulting in an exploitable use-after-free condition.

    * 

      MFSA 2014-31 / CVE-2014-1513: Security researcher Jueri Aedla, via
      TippingPoint's Pwn2Own contest, reported that TypedArrayObject does
      not handle the case where ArrayBuffer objects are neutered, setting
      their length to zero while still in use. This leads to out-of-bounds
      reads and writes into the JavaScript heap, allowing for arbitrary
      code execution.

    * 

      MFSA 2014-32 / CVE-2014-1514: Security researcher George Hotz, via
      TippingPoint's Pwn2Own contest, discovered an issue where values are
      copied from an array into a second, neutered array. This allows for
      an out-of-bounds write into memory, causing an exploitable crash
      leading to arbitrary code execution.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/868603">SUSE bug 868603</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1493/">CVE-2014-1493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1494/">CVE-2014-1494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1496/">CVE-2014-1496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1497/">CVE-2014-1497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1498/">CVE-2014-1498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1499/">CVE-2014-1499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1500/">CVE-2014-1500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1501/">CVE-2014-1501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1502/">CVE-2014-1502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1504/">CVE-2014-1504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1505/">CVE-2014-1505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1508/">CVE-2014-1508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1509/">CVE-2014-1509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1510/">CVE-2014-1510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1511/">CVE-2014-1511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1512/">CVE-2014-1512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1513/">CVE-2014-1513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1514/">CVE-2014-1514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566446" comment="MozillaFirefox-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566447" comment="MozillaFirefox-branding-SLED-24-0.7.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566448" comment="MozillaFirefox-translations-24.4.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566331" comment="mozilla-nspr-4.10.4-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566332" comment="mozilla-nspr-32bit-4.10.4-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78308" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="887746" ref_url="https://bugzilla.suse.com/887746" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544/" source="CVE"/>
		<reference ref_id="CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547/" source="CVE"/>
		<reference ref_id="CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548/" source="CVE"/>
		<reference ref_id="CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555/" source="CVE"/>
		<reference ref_id="CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556/" source="CVE"/>
		<reference ref_id="CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 24.7ESR security release.

Security issues fixed in this release:

    * CVE-2014-1544 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-63.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-63.html&gt;
    * CVE-2014-1548 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-56.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-56.html&gt;
    * CVE-2014-1549 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-57.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-57.html&gt;
    * CVE-2014-1550 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-58.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-58.html&gt;
    * CVE-2014-1551 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-59.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-59.html&gt;
    * CVE-2014-1552 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-66.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-66.html&gt;
    * CVE-2014-1555 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-61.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-61.html&gt;
    * CVE-2014-1556 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-62.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-62.html&gt;
    * CVE-2014-1557 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-64.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-64.html&gt;
    * CVE-2014-1558,CVE-2014-1559,CVE-2014-1560 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-65.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-65.html&gt;
    * CVE-2014-1561 - 
      https://www.mozilla.org/security/announce/2014/mfsa2014-60.html
      &lt;https://www.mozilla.org/security/announce/2014/mfsa2014-60.html&gt;

Security Issues:

    * CVE-2014-1557
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557&gt;
    * CVE-2014-1547
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547&gt;
    * CVE-2014-1548
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548&gt;
    * CVE-2014-1556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556&gt;
    * CVE-2014-1544
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544&gt;
    * CVE-2014-1555
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566449" comment="MozillaFirefox-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566450" comment="MozillaFirefox-translations-24.7.0esr-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566451" comment="libfreebl3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566452" comment="libfreebl3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566453" comment="libsoftokn3-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566454" comment="libsoftokn3-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566455" comment="mozilla-nss-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566456" comment="mozilla-nss-32bit-3.16.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566457" comment="mozilla-nss-tools-3.16.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78309" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="894370" ref_url="https://bugzilla.suse.com/894370" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562/" source="CVE"/>
		<reference ref_id="CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567/" source="CVE"/>
		<description>

Mozilla Firefox was updated to the 24.8.0ESR release, fixing security 
issues and bugs.

Only some of the published security advisories affect the Mozilla Firefox 
24ESR codestream:

    * MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht
      reported, via TippingPoint's Zero Day Initiative, a use-after-free
      during text layout when interacting with the setting of text
      direction. This results in a use-after-free which can lead to
      arbitrary code execution.
    * MFSA 2014-67: Mozilla developers and community identified and fixed
      several memory safety bugs in the browser engine used in Firefox and
      other Mozilla-based products. Some of these bugs showed evidence of
      memory corruption under certain circumstances, and we presume that
      with enough effort at least some of these could be exploited to run
      arbitrary code.
    * Jan de Mooij reported a memory safety problem that affects Firefox
      ESR 24.7, ESR 31 and Firefox 31. (CVE-2014-1562)

More information is referenced on: 
https://www.mozilla.org/security/announce/
&lt;https://www.mozilla.org/security/announce/&gt; .

Security Issues:

    * CVE-2014-1562
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562&gt;
    * CVE-2014-1567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566458" comment="MozillaFirefox-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566459" comment="MozillaFirefox-translations-24.8.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566460" comment="libfreebl3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566461" comment="libfreebl3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566462" comment="libsoftokn3-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566463" comment="libsoftokn3-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566464" comment="mozilla-nspr-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566465" comment="mozilla-nspr-32bit-4.10.7-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566466" comment="mozilla-nss-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566467" comment="mozilla-nss-32bit-3.16.4-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566468" comment="mozilla-nss-tools-3.16.4-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78310" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="908009" ref_url="https://bugzilla.suse.com/908009" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-1595" ref_url="https://www.suse.com/security/cve/CVE-2014-1595/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.3ESR release fixing bugs and 
security issues.

    * 

      MFSA 2014-83 / CVE-2014-1588 / CVE-2014-1587: Mozilla developers and
      community identified and fixed several memory safety bugs in the
      browser engine used in Firefox and other Mozilla-based products. Some
      of these bugs showed evidence of memory corruption under certain
      circumstances, and we presume that with enough effort at least some
      of these could be exploited to run arbitrary code.

    * 

      MFSA 2014-85 / CVE-2014-1590: Security researcher Joe Vennix from
      Rapid7 reported that passing a JavaScript object to XMLHttpRequest
      that mimics an input stream will a crash. This crash is not
      exploitable and can only be used for denial of service attacks.

    * 

      MFSA 2014-87 / CVE-2014-1592: Security researcher Berend-Jan Wever
      reported a use-after-free created by triggering the creation of a
      second root element while parsing HTML written to a document created
      with document.open(). This leads to a potentially exploitable crash.

    * 

      MFSA 2014-88 / CVE-2014-1593: Security researcher Abhishek Arya
      (Inferno) of the Google Chrome Security Team used the Address
      Sanitizer tool to discover a buffer overflow during the parsing of
      media content. This leads to a potentially exploitable crash.

    * 

      MFSA 2014-89 / CVE-2014-1594: Security researchers Byoungyoung Lee,
      Chengyu Song, and Taesoo Kim at the Georgia Tech Information Security
      Center (GTISC) reported a bad casting from the BasicThebesLayer to
      BasicContainerLayer, resulting in undefined behavior. This behavior
      is potentially exploitable with some compilers but no clear mechanism
      to trigger it through web content was identified.

    * 

      MFSA 2014-90 / CVE-2014-1595: Security researcher Kent Howard
      reported an Apple issue present in OS X 10.10 (Yosemite) where log
      files are created by the CoreGraphics framework of OS X in the /tmp
      local directory. These log files contain a record of all inputs into
      Mozilla programs during their operation. In versions of OS X from
      versions 10.6 through 10.9, the CoreGraphics had this logging ability
      but it was turned off by default. In OS X 10.10, this logging was
      turned on by default for some applications that use a custom memory
      allocator, such as jemalloc, because of an initialization bug in the
      framework. This issue has been addressed in Mozilla products by
      explicitly turning off the framework's logging of input events. On
      vulnerable systems, this issue can result in private data such as
      usernames, passwords, and other inputed data being saved to a log
      file on the local system.

Security Issues:

    * CVE-2014-1587
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587&gt;
    * CVE-2014-1588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588&gt;
    * CVE-2014-1589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589&gt;
    * CVE-2014-1590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590&gt;
    * CVE-2014-1591
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591&gt;
    * CVE-2014-1592
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592&gt;
    * CVE-2014-1593
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593&gt;
    * CVE-2014-1594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594&gt;
    * CVE-2014-1595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-08"/>
	<updated date="2014-12-08"/>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1595/">CVE-2014-1595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566469" comment="MozillaFirefox-31.3.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566470" comment="MozillaFirefox-translations-31.3.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78311" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="910647" ref_url="https://bugzilla.suse.com/910647" source="BUGZILLA"/>
		<reference ref_id="910669" ref_url="https://bugzilla.suse.com/910669" source="BUGZILLA"/>
		<reference ref_id="913064" ref_url="https://bugzilla.suse.com/913064" source="BUGZILLA"/>
		<reference ref_id="913066" ref_url="https://bugzilla.suse.com/913066" source="BUGZILLA"/>
		<reference ref_id="913067" ref_url="https://bugzilla.suse.com/913067" source="BUGZILLA"/>
		<reference ref_id="913068" ref_url="https://bugzilla.suse.com/913068" source="BUGZILLA"/>
		<reference ref_id="913102" ref_url="https://bugzilla.suse.com/913102" source="BUGZILLA"/>
		<reference ref_id="913103" ref_url="https://bugzilla.suse.com/913103" source="BUGZILLA"/>
		<reference ref_id="913104" ref_url="https://bugzilla.suse.com/913104" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<description>

Mozilla Firefox has been updated to the 31.4.0ESR release, fixing bugs and 
security issues.

Mozilla NSS has been updated to 3.17.3, fixing a security issue and 
updating the root certificate list.

For more information, please see 
https://www.mozilla.org/en-US/security/advisories/
&lt;https://www.mozilla.org/en-US/security/advisories/&gt;

Security Issues:

    * CVE-2014-1569
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569&gt;
    * CVE-2014-8634
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634&gt;
    * CVE-2014-8639
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639&gt;
    * CVE-2014-8641
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641&gt;
    * CVE-2014-8638
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638&gt;
    * CVE-2014-8636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636&gt;
    * CVE-2014-8637
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637&gt;
    * CVE-2014-8640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-27"/>
	<updated date="2015-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913102">SUSE bug 913102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913103">SUSE bug 913103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913104">SUSE bug 913104</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566471" comment="MozillaFirefox-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566472" comment="MozillaFirefox-translations-31.4.0esr-0.8.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566473" comment="libfreebl3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566474" comment="libfreebl3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566475" comment="libsoftokn3-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566476" comment="libsoftokn3-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566477" comment="mozilla-nss-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566478" comment="mozilla-nss-32bit-3.17.3-0.8.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566479" comment="mozilla-nss-tools-3.17.3-0.8.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78312" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="923534" ref_url="https://bugzilla.suse.com/923534" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to the 31.5.3ESR release to fix two security 
vulnerabilities:

    * 

      MFSA 2015-29 / CVE-2015-0817: Security researcher ilxu1a reported,
      through HP Zero Day Initiative's Pwn2Own contest, a flaw in Mozilla's
      implementation of typed array bounds checking in JavaScript
      just-in-time compilation (JIT) and its management of bounds checking
      for heap access. This flaw can be leveraged into the reading and
      writing of memory allowing for arbitary code execution on the local
      system.

    * 

      MFSA 2015-28 / CVE-2015-0818: Security researcher Mariusz Mlynski
      reported, through HP Zero Day Initiative's Pwn2Own contest, a method
      to run arbitrary scripts in a privileged context. This bypassed the
      same-origin policy protections by using a flaw in the processing of
      SVG format content navigation.

Security Issues:

    * CVE-2015-0817
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817&gt;
    * CVE-2015-0818
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566480" comment="MozillaFirefox-31.5.3esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566481" comment="MozillaFirefox-translations-31.5.3esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78313" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="930622" ref_url="https://bugzilla.suse.com/930622" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<description>

This update to Firefox 31.7.0 ESR fixes the following issues:

    * 

      MFSA 2015-46 (CVE-2015-2708, CVE-2015-2709): Miscellaneous memory
      safety hazards (rv:38.0 / rv:31.7). Upstream references: bmo#1120655,
      bmo#1143299, bmo#1151139, bmo#1152177, bmo#1111251, bmo#1117977,
      bmo#1128064, bmo#1135066, bmo#1143194, bmo#1146101, bmo#1149526,
      bmo#1153688, bmo#1155474.

    * 

      MFSA 2015-47 (CVE-2015-0797): Buffer overflow parsing H.264 video
      with Linux Gstreamer. Upstream references: bmo#1080995.

    * 

      MFSA 2015-48 (CVE-2015-2710): Buffer overflow with SVG content and
      CSS. Upstream references: bmo#1149542.

    * 

      MFSA 2015-51 (CVE-2015-2713): Use-after-free during text processing
      with vertical text enabled. Upstream references: bmo#1153478.

    * 

      MFSA 2015-54 (CVE-2015-2716): Buffer overflow when parsing compressed
      XML. Upstream references: bmo#1140537.

Security Issues:

    * CVE-2015-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797&gt;
    * CVE-2015-2708
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708&gt;
    * CVE-2015-2709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709&gt;
    * CVE-2015-2710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710&gt;
    * CVE-2015-2713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713&gt;
    * CVE-2015-2716
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-19"/>
	<updated date="2015-05-19"/>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566482" comment="MozillaFirefox-31.7.0esr-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566483" comment="MozillaFirefox-translations-31.7.0esr-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78314" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78315" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78316" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78317" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla Firefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="854367" ref_url="https://bugzilla.suse.com/854367" source="BUGZILLA"/>
		<reference ref_id="854370" ref_url="https://bugzilla.suse.com/854370" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609/" source="CVE"/>
		<reference ref_id="CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610/" source="CVE"/>
		<reference ref_id="CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611/" source="CVE"/>
		<reference ref_id="CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612/" source="CVE"/>
		<reference ref_id="CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613/" source="CVE"/>
		<reference ref_id="CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614/" source="CVE"/>
		<reference ref_id="CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615/" source="CVE"/>
		<reference ref_id="CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616/" source="CVE"/>
		<reference ref_id="CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618/" source="CVE"/>
		<reference ref_id="CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619/" source="CVE"/>
		<reference ref_id="CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671/" source="CVE"/>
		<reference ref_id="CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672/" source="CVE"/>
		<reference ref_id="CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673/" source="CVE"/>
		<description>

MozillaFirefox has been updated to the 24.2.0 ESR security release.

This is a major upgrade from the 17 ESR release branch.

Security issues fixed:

    * CVE-2013-5611 Application Installation doorhanger persists on
      navigation (MFSA 2013-105)
    * CVE-2013-5609 Miscellaneous memory safety hazards (rv:24.2) (MFSA
      2013-104)
    * CVE-2013-5610 Miscellaneous memory safety hazards (rv:26.0) (MFSA
      2013-104)
    * CVE-2013-5612 Character encoding cross-origin XSS attack (MFSA
      2013-106)
    * CVE-2013-5614 Sandbox restrictions not applied to nested object
      elements (MFSA 2013-107)
    * CVE-2013-5616 Use-after-free in event listeners (MFSA 2013-108)
    * CVE-2013-5619 Potential overflow in JavaScript binary search
      algorithms (MFSA 2013-110)
    * CVE-2013-6671 Segmentation violation when replacing ordered list
      elements (MFSA 2013-111)
    * CVE-2013-6673 Trust settings for built-in roots ignored during EV
      certificate validation (MFSA 2013-113)
    * CVE-2013-5613 Use-after-free in synthetic mouse movement (MFSA
      2013-114)
    * CVE-2013-5615 GetElementIC typed array stubs can be generated outside
      observed typesets (MFSA 2013-115)
    * CVE-2013-6672 Linux clipboard information disclosure though selection
      paste (MFSA 2013-112)
    * CVE-2013-5618 Use-after-free during Table Editing (MFSA 2013-109)

Security Issue references:

    * CVE-2013-5609
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609&gt;
    * CVE-2013-5610
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610&gt;
    * CVE-2013-5611
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611&gt;
    * CVE-2013-5612
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612&gt;
    * CVE-2013-5613
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613&gt;
    * CVE-2013-5614
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614&gt;
    * CVE-2013-5615
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615&gt;
    * CVE-2013-5616
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616&gt;
    * CVE-2013-5618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618&gt;
    * CVE-2013-5619
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619&gt;
    * CVE-2013-6671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671&gt;
    * CVE-2013-6672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672&gt;
    * CVE-2013-6673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-16"/>
	<updated date="2013-12-16"/>
	<bugzilla href="https://bugzilla.suse.com/854367">SUSE bug 854367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566500" comment="MozillaFirefox-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566501" comment="MozillaFirefox-branding-SLED-24-0.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566502" comment="MozillaFirefox-translations-24.2.0esr-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566503" comment="libfreebl3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566504" comment="libfreebl3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566505" comment="libsoftokn3-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566506" comment="libsoftokn3-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566507" comment="mozilla-nss-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566508" comment="mozilla-nss-32bit-3.15.3.1-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566509" comment="mozilla-nss-tools-3.15.3.1-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78318" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="900941" ref_url="https://bugzilla.suse.com/900941" source="BUGZILLA"/>
		<reference ref_id="905056" ref_url="https://bugzilla.suse.com/905056" source="BUGZILLA"/>
		<reference ref_id="905528" ref_url="https://bugzilla.suse.com/905528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574/" source="CVE"/>
		<reference ref_id="CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575/" source="CVE"/>
		<reference ref_id="CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576/" source="CVE"/>
		<reference ref_id="CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577/" source="CVE"/>
		<reference ref_id="CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578/" source="CVE"/>
		<reference ref_id="CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581/" source="CVE"/>
		<reference ref_id="CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583/" source="CVE"/>
		<reference ref_id="CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585/" source="CVE"/>
		<reference ref_id="CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586/" source="CVE"/>
		<description>

This version update of Mozilla Firefox to 31.2.0ESR brings improvements, 
stability fixes and also security fixes for the following CVEs:

CVE-2014-1574, CVE-2014-1575, CVE-2014-1576 ,CVE-2014-1577, CVE-2014-1578, 
CVE-2014-1581, CVE-2014-1583, CVE-2014-1585, CVE-2014-1586

It also disables SSLv3 by default to mitigate the protocol downgrade attack 
known as POODLE.

This update fixes some regressions introduced by the previously released 
update.

Security Issues:

    * CVE-2014-1574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574&gt;
    * CVE-2014-1575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575&gt;
    * CVE-2014-1576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576&gt;
    * CVE-2014-1577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577&gt;
    * CVE-2014-1578
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578&gt;
    * CVE-2014-1581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581&gt;
    * CVE-2014-1583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583&gt;
    * CVE-2014-1585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585&gt;
    * CVE-2014-1586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-15"/>
	<updated date="2014-11-15"/>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905056">SUSE bug 905056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905528">SUSE bug 905528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566510" comment="MozillaFirefox-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566511" comment="MozillaFirefox-branding-SLED-31.0-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566512" comment="MozillaFirefox-translations-31.2.0esr-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566513" comment="libfreebl3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566514" comment="libfreebl3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566515" comment="libsoftokn3-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566516" comment="libsoftokn3-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566517" comment="mozilla-nspr-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566518" comment="mozilla-nspr-32bit-4.10.7-0.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566519" comment="mozilla-nss-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566520" comment="mozilla-nss-32bit-3.17.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566521" comment="mozilla-nss-tools-3.17.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78319" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-10"/>
	<updated date="2015-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78320" version="1" class="patch">
	<metadata>
		<title>Security update for flac</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="906831" ref_url="https://bugzilla.suse.com/906831" source="BUGZILLA"/>
		<reference ref_id="907016" ref_url="https://bugzilla.suse.com/907016" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<description>

flac was updated to fix two security issues:

    * Stack overflow may result in arbitrary code execution
      (CVE-2014-8962).
    * Heap overflow via specially crafted .flac files (CVE-2014-9028).

Security Issues:

    * CVE-2014-8962
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962&gt;
    * CVE-2014-9028
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-01"/>
	<updated date="2014-12-01"/>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566532" comment="libFLAC++6-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566533" comment="libFLAC8-1.2.1-68.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566534" comment="libFLAC8-32bit-1.2.1-68.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78321" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="905032" ref_url="https://bugzilla.suse.com/905032" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0573" ref_url="https://www.suse.com/security/cve/CVE-2014-0573/" source="CVE"/>
		<reference ref_id="CVE-2014-0574" ref_url="https://www.suse.com/security/cve/CVE-2014-0574/" source="CVE"/>
		<reference ref_id="CVE-2014-0576" ref_url="https://www.suse.com/security/cve/CVE-2014-0576/" source="CVE"/>
		<reference ref_id="CVE-2014-0577" ref_url="https://www.suse.com/security/cve/CVE-2014-0577/" source="CVE"/>
		<reference ref_id="CVE-2014-0581" ref_url="https://www.suse.com/security/cve/CVE-2014-0581/" source="CVE"/>
		<reference ref_id="CVE-2014-0582" ref_url="https://www.suse.com/security/cve/CVE-2014-0582/" source="CVE"/>
		<reference ref_id="CVE-2014-0583" ref_url="https://www.suse.com/security/cve/CVE-2014-0583/" source="CVE"/>
		<reference ref_id="CVE-2014-0584" ref_url="https://www.suse.com/security/cve/CVE-2014-0584/" source="CVE"/>
		<reference ref_id="CVE-2014-0585" ref_url="https://www.suse.com/security/cve/CVE-2014-0585/" source="CVE"/>
		<reference ref_id="CVE-2014-0586" ref_url="https://www.suse.com/security/cve/CVE-2014-0586/" source="CVE"/>
		<reference ref_id="CVE-2014-0588" ref_url="https://www.suse.com/security/cve/CVE-2014-0588/" source="CVE"/>
		<reference ref_id="CVE-2014-0589" ref_url="https://www.suse.com/security/cve/CVE-2014-0589/" source="CVE"/>
		<reference ref_id="CVE-2014-0590" ref_url="https://www.suse.com/security/cve/CVE-2014-0590/" source="CVE"/>
		<reference ref_id="CVE-2014-8437" ref_url="https://www.suse.com/security/cve/CVE-2014-8437/" source="CVE"/>
		<reference ref_id="CVE-2014-8438" ref_url="https://www.suse.com/security/cve/CVE-2014-8438/" source="CVE"/>
		<reference ref_id="CVE-2014-8440" ref_url="https://www.suse.com/security/cve/CVE-2014-8440/" source="CVE"/>
		<reference ref_id="CVE-2014-8441" ref_url="https://www.suse.com/security/cve/CVE-2014-8441/" source="CVE"/>
		<reference ref_id="CVE-2014-8442" ref_url="https://www.suse.com/security/cve/CVE-2014-8442/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00009.html" source="SUSE-SU"/>
		<description>

flash-player was updated to version 11.2.202.418 to fix 18 security issues:

    * Memory corruption vulnerabilities that could lead to code execution
      (CVE-2014-0576, CVE-2014-0581, CVE-2014-8440, CVE-2014-8441).
    * Use-after-free vulnerabilities that could lead to code execution
      (CVE-2014-0573, CVE-2014-0588, CVE-2014-8438).
    * A double free vulnerability that could lead to code execution
      (CVE-2014-0574).
    * Type confusion vulnerabilities that could lead to code execution
      (CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
      CVE-2014-0590).
    * Heap buffer overflow vulnerabilities that could lead to code
      execution (CVE-2014-0582, CVE-2014-0589).
    * An information disclosure vulnerability that could be exploited to
      disclose session tokens (CVE-2014-8437).
    * A heap buffer overflow vulnerability that could be exploited to
      perform privilege escalation from low to medium integrity level
      (CVE-2014-0583).
    * A permission issue that could be exploited to perform privilege
      escalation from low to medium integrity level (CVE-2014-8442).

Further information can be found at 
http://helpx.adobe.com/security/products/flash-player/apsb14-24.html
&lt;http://helpx.adobe.com/security/products/flash-player/apsb14-24.html&gt; .

Security Issues:

    * CVE-2014-0576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0576&gt;
    * CVE-2014-0581
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0581&gt;
    * CVE-2014-8440
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8440&gt;
    * CVE-2014-8441
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8441&gt;
    * CVE-2014-0573
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0573&gt;
    * CVE-2014-0588
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0588&gt;
    * CVE-2014-8438
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8438&gt;
    * CVE-2014-0574
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0574&gt;
    * CVE-2014-0577
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0577&gt;
    * CVE-2014-0584
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0584&gt;
    * CVE-2014-0585
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0585&gt;
    * CVE-2014-0586
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0586&gt;
    * CVE-2014-0590
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0590&gt;
    * CVE-2014-0582
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0582&gt;
    * CVE-2014-0589
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0589&gt;
    * CVE-2014-8437
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8437&gt;
    * CVE-2014-0583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0583&gt;
    * CVE-2014-8442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8442&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/905032">SUSE bug 905032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0573/">CVE-2014-0573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0574/">CVE-2014-0574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0576/">CVE-2014-0576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0577/">CVE-2014-0577</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0581/">CVE-2014-0581</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0582/">CVE-2014-0582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0583/">CVE-2014-0583</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0584/">CVE-2014-0584</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0585/">CVE-2014-0585</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0586/">CVE-2014-0586</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0588/">CVE-2014-0588</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0589/">CVE-2014-0589</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0590/">CVE-2014-0590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8437/">CVE-2014-8437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8438/">CVE-2014-8438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8440/">CVE-2014-8440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8441/">CVE-2014-8441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8442/">CVE-2014-8442</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566535" comment="flash-player-11.2.202.418-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566536" comment="flash-player-gnome-11.2.202.418-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566537" comment="flash-player-kde4-11.2.202.418-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78322" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="937339" ref_url="https://bugzilla.suse.com/937339" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0578" ref_url="https://www.suse.com/security/cve/CVE-2014-0578/" source="CVE"/>
		<reference ref_id="CVE-2015-3114" ref_url="https://www.suse.com/security/cve/CVE-2015-3114/" source="CVE"/>
		<reference ref_id="CVE-2015-3115" ref_url="https://www.suse.com/security/cve/CVE-2015-3115/" source="CVE"/>
		<reference ref_id="CVE-2015-3116" ref_url="https://www.suse.com/security/cve/CVE-2015-3116/" source="CVE"/>
		<reference ref_id="CVE-2015-3117" ref_url="https://www.suse.com/security/cve/CVE-2015-3117/" source="CVE"/>
		<reference ref_id="CVE-2015-3118" ref_url="https://www.suse.com/security/cve/CVE-2015-3118/" source="CVE"/>
		<reference ref_id="CVE-2015-3119" ref_url="https://www.suse.com/security/cve/CVE-2015-3119/" source="CVE"/>
		<reference ref_id="CVE-2015-3120" ref_url="https://www.suse.com/security/cve/CVE-2015-3120/" source="CVE"/>
		<reference ref_id="CVE-2015-3121" ref_url="https://www.suse.com/security/cve/CVE-2015-3121/" source="CVE"/>
		<reference ref_id="CVE-2015-3122" ref_url="https://www.suse.com/security/cve/CVE-2015-3122/" source="CVE"/>
		<reference ref_id="CVE-2015-3123" ref_url="https://www.suse.com/security/cve/CVE-2015-3123/" source="CVE"/>
		<reference ref_id="CVE-2015-3124" ref_url="https://www.suse.com/security/cve/CVE-2015-3124/" source="CVE"/>
		<reference ref_id="CVE-2015-3125" ref_url="https://www.suse.com/security/cve/CVE-2015-3125/" source="CVE"/>
		<reference ref_id="CVE-2015-3126" ref_url="https://www.suse.com/security/cve/CVE-2015-3126/" source="CVE"/>
		<reference ref_id="CVE-2015-3127" ref_url="https://www.suse.com/security/cve/CVE-2015-3127/" source="CVE"/>
		<reference ref_id="CVE-2015-3128" ref_url="https://www.suse.com/security/cve/CVE-2015-3128/" source="CVE"/>
		<reference ref_id="CVE-2015-3129" ref_url="https://www.suse.com/security/cve/CVE-2015-3129/" source="CVE"/>
		<reference ref_id="CVE-2015-3130" ref_url="https://www.suse.com/security/cve/CVE-2015-3130/" source="CVE"/>
		<reference ref_id="CVE-2015-3131" ref_url="https://www.suse.com/security/cve/CVE-2015-3131/" source="CVE"/>
		<reference ref_id="CVE-2015-3132" ref_url="https://www.suse.com/security/cve/CVE-2015-3132/" source="CVE"/>
		<reference ref_id="CVE-2015-3133" ref_url="https://www.suse.com/security/cve/CVE-2015-3133/" source="CVE"/>
		<reference ref_id="CVE-2015-3134" ref_url="https://www.suse.com/security/cve/CVE-2015-3134/" source="CVE"/>
		<reference ref_id="CVE-2015-3135" ref_url="https://www.suse.com/security/cve/CVE-2015-3135/" source="CVE"/>
		<reference ref_id="CVE-2015-3136" ref_url="https://www.suse.com/security/cve/CVE-2015-3136/" source="CVE"/>
		<reference ref_id="CVE-2015-3137" ref_url="https://www.suse.com/security/cve/CVE-2015-3137/" source="CVE"/>
		<reference ref_id="CVE-2015-4428" ref_url="https://www.suse.com/security/cve/CVE-2015-4428/" source="CVE"/>
		<reference ref_id="CVE-2015-4429" ref_url="https://www.suse.com/security/cve/CVE-2015-4429/" source="CVE"/>
		<reference ref_id="CVE-2015-4430" ref_url="https://www.suse.com/security/cve/CVE-2015-4430/" source="CVE"/>
		<reference ref_id="CVE-2015-4431" ref_url="https://www.suse.com/security/cve/CVE-2015-4431/" source="CVE"/>
		<reference ref_id="CVE-2015-4432" ref_url="https://www.suse.com/security/cve/CVE-2015-4432/" source="CVE"/>
		<reference ref_id="CVE-2015-4433" ref_url="https://www.suse.com/security/cve/CVE-2015-4433/" source="CVE"/>
		<reference ref_id="CVE-2015-5116" ref_url="https://www.suse.com/security/cve/CVE-2015-5116/" source="CVE"/>
		<reference ref_id="CVE-2015-5117" ref_url="https://www.suse.com/security/cve/CVE-2015-5117/" source="CVE"/>
		<reference ref_id="CVE-2015-5118" ref_url="https://www.suse.com/security/cve/CVE-2015-5118/" source="CVE"/>
		<reference ref_id="CVE-2015-5119" ref_url="https://www.suse.com/security/cve/CVE-2015-5119/" source="CVE"/>
		<description>
flash-player was updated to fix 35 security issues.

These security issues were fixed:
- CVE-2015-3135, CVE-2015-4432, CVE-2015-5118: Heap buffer overflow vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, CVE-2015-4431: Memory corruption vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3126, CVE-2015-4429: Null pointer dereference issues (bsc#937339).
- CVE-2015-3114: A security bypass vulnerability that could lead to information disclosure (bsc#937339).
- CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, CVE-2015-4433: Type confusion vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3118, CVE-2015-3124, CVE-2015-5117, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, CVE-2015-5119: Use-after-free vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116: Vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure (bsc#937339).
 		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-09"/>
	<updated date="2015-07-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0578/">CVE-2014-0578</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3114/">CVE-2015-3114</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3115/">CVE-2015-3115</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3116/">CVE-2015-3116</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3117/">CVE-2015-3117</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3118/">CVE-2015-3118</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3119/">CVE-2015-3119</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3120/">CVE-2015-3120</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3121/">CVE-2015-3121</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3122/">CVE-2015-3122</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3123/">CVE-2015-3123</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3124/">CVE-2015-3124</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3125/">CVE-2015-3125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3126/">CVE-2015-3126</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3127/">CVE-2015-3127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3128/">CVE-2015-3128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3129/">CVE-2015-3129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3130/">CVE-2015-3130</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3131/">CVE-2015-3131</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3132/">CVE-2015-3132</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3133/">CVE-2015-3133</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3134/">CVE-2015-3134</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3135/">CVE-2015-3135</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3136/">CVE-2015-3136</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3137/">CVE-2015-3137</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4428/">CVE-2015-4428</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4429/">CVE-2015-4429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4430/">CVE-2015-4430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4431/">CVE-2015-4431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4432/">CVE-2015-4432</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4433/">CVE-2015-4433</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5116/">CVE-2015-5116</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5117/">CVE-2015-5117</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5118/">CVE-2015-5118</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5119/">CVE-2015-5119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78323" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="937752" ref_url="https://bugzilla.suse.com/937752" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5122" ref_url="https://www.suse.com/security/cve/CVE-2015-5122/" source="CVE"/>
		<reference ref_id="CVE-2015-5123" ref_url="https://www.suse.com/security/cve/CVE-2015-5123/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-5123: Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function (bsc#937752).
- CVE-2015-5122: Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property (bsc#937752).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-16"/>
	<updated date="2015-07-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5122/">CVE-2015-5122</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5123/">CVE-2015-5123</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566541" comment="flash-player-11.2.202.491-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566542" comment="flash-player-gnome-11.2.202.491-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566543" comment="flash-player-kde4-11.2.202.491-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78324" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="941239" ref_url="https://bugzilla.suse.com/941239" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3107" ref_url="https://www.suse.com/security/cve/CVE-2015-3107/" source="CVE"/>
		<reference ref_id="CVE-2015-5124" ref_url="https://www.suse.com/security/cve/CVE-2015-5124/" source="CVE"/>
		<reference ref_id="CVE-2015-5125" ref_url="https://www.suse.com/security/cve/CVE-2015-5125/" source="CVE"/>
		<reference ref_id="CVE-2015-5127" ref_url="https://www.suse.com/security/cve/CVE-2015-5127/" source="CVE"/>
		<reference ref_id="CVE-2015-5128" ref_url="https://www.suse.com/security/cve/CVE-2015-5128/" source="CVE"/>
		<reference ref_id="CVE-2015-5129" ref_url="https://www.suse.com/security/cve/CVE-2015-5129/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5131" ref_url="https://www.suse.com/security/cve/CVE-2015-5131/" source="CVE"/>
		<reference ref_id="CVE-2015-5132" ref_url="https://www.suse.com/security/cve/CVE-2015-5132/" source="CVE"/>
		<reference ref_id="CVE-2015-5133" ref_url="https://www.suse.com/security/cve/CVE-2015-5133/" source="CVE"/>
		<reference ref_id="CVE-2015-5134" ref_url="https://www.suse.com/security/cve/CVE-2015-5134/" source="CVE"/>
		<reference ref_id="CVE-2015-5539" ref_url="https://www.suse.com/security/cve/CVE-2015-5539/" source="CVE"/>
		<reference ref_id="CVE-2015-5540" ref_url="https://www.suse.com/security/cve/CVE-2015-5540/" source="CVE"/>
		<reference ref_id="CVE-2015-5541" ref_url="https://www.suse.com/security/cve/CVE-2015-5541/" source="CVE"/>
		<reference ref_id="CVE-2015-5544" ref_url="https://www.suse.com/security/cve/CVE-2015-5544/" source="CVE"/>
		<reference ref_id="CVE-2015-5545" ref_url="https://www.suse.com/security/cve/CVE-2015-5545/" source="CVE"/>
		<reference ref_id="CVE-2015-5546" ref_url="https://www.suse.com/security/cve/CVE-2015-5546/" source="CVE"/>
		<reference ref_id="CVE-2015-5547" ref_url="https://www.suse.com/security/cve/CVE-2015-5547/" source="CVE"/>
		<reference ref_id="CVE-2015-5548" ref_url="https://www.suse.com/security/cve/CVE-2015-5548/" source="CVE"/>
		<reference ref_id="CVE-2015-5549" ref_url="https://www.suse.com/security/cve/CVE-2015-5549/" source="CVE"/>
		<reference ref_id="CVE-2015-5550" ref_url="https://www.suse.com/security/cve/CVE-2015-5550/" source="CVE"/>
		<reference ref_id="CVE-2015-5551" ref_url="https://www.suse.com/security/cve/CVE-2015-5551/" source="CVE"/>
		<reference ref_id="CVE-2015-5552" ref_url="https://www.suse.com/security/cve/CVE-2015-5552/" source="CVE"/>
		<reference ref_id="CVE-2015-5553" ref_url="https://www.suse.com/security/cve/CVE-2015-5553/" source="CVE"/>
		<reference ref_id="CVE-2015-5554" ref_url="https://www.suse.com/security/cve/CVE-2015-5554/" source="CVE"/>
		<reference ref_id="CVE-2015-5555" ref_url="https://www.suse.com/security/cve/CVE-2015-5555/" source="CVE"/>
		<reference ref_id="CVE-2015-5556" ref_url="https://www.suse.com/security/cve/CVE-2015-5556/" source="CVE"/>
		<reference ref_id="CVE-2015-5557" ref_url="https://www.suse.com/security/cve/CVE-2015-5557/" source="CVE"/>
		<reference ref_id="CVE-2015-5558" ref_url="https://www.suse.com/security/cve/CVE-2015-5558/" source="CVE"/>
		<reference ref_id="CVE-2015-5559" ref_url="https://www.suse.com/security/cve/CVE-2015-5559/" source="CVE"/>
		<reference ref_id="CVE-2015-5560" ref_url="https://www.suse.com/security/cve/CVE-2015-5560/" source="CVE"/>
		<reference ref_id="CVE-2015-5561" ref_url="https://www.suse.com/security/cve/CVE-2015-5561/" source="CVE"/>
		<reference ref_id="CVE-2015-5562" ref_url="https://www.suse.com/security/cve/CVE-2015-5562/" source="CVE"/>
		<reference ref_id="CVE-2015-5563" ref_url="https://www.suse.com/security/cve/CVE-2015-5563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<description>


This security update to 11.2.202.508 (bsc#941239) fixes the
following issues:

  * APSB15-19: CVE-2015-3107, CVE-2015-5124, CVE-2015-5125,
    CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
    CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134,
    CVE-2015-5539, CVE-2015-5540, CVE-2015-5541, CVE-2015-5544,
    CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548,
    CVE-2015-5549, CVE-2015-5550, CVE-2015-5551, CVE-2015-5552,
    CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
    CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560,
    CVE-2015-5561, CVE-2015-5562, CVE-2015-5563
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3107/">CVE-2015-3107</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5124/">CVE-2015-5124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5125/">CVE-2015-5125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5127/">CVE-2015-5127</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5128/">CVE-2015-5128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5129/">CVE-2015-5129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5131/">CVE-2015-5131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5132/">CVE-2015-5132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5133/">CVE-2015-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5134/">CVE-2015-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5539/">CVE-2015-5539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5540/">CVE-2015-5540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5541/">CVE-2015-5541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5544/">CVE-2015-5544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5545/">CVE-2015-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5546/">CVE-2015-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5547/">CVE-2015-5547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5548/">CVE-2015-5548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5549/">CVE-2015-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5550/">CVE-2015-5550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5551/">CVE-2015-5551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5552/">CVE-2015-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5553/">CVE-2015-5553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5554/">CVE-2015-5554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5555/">CVE-2015-5555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5556/">CVE-2015-5556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5557/">CVE-2015-5557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5558/">CVE-2015-5558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5559/">CVE-2015-5559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5560/">CVE-2015-5560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5561/">CVE-2015-5561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5562/">CVE-2015-5562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5563/">CVE-2015-5563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78325" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="946880" ref_url="https://bugzilla.suse.com/946880" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5567" ref_url="https://www.suse.com/security/cve/CVE-2015-5567/" source="CVE"/>
		<reference ref_id="CVE-2015-5568" ref_url="https://www.suse.com/security/cve/CVE-2015-5568/" source="CVE"/>
		<reference ref_id="CVE-2015-5570" ref_url="https://www.suse.com/security/cve/CVE-2015-5570/" source="CVE"/>
		<reference ref_id="CVE-2015-5571" ref_url="https://www.suse.com/security/cve/CVE-2015-5571/" source="CVE"/>
		<reference ref_id="CVE-2015-5572" ref_url="https://www.suse.com/security/cve/CVE-2015-5572/" source="CVE"/>
		<reference ref_id="CVE-2015-5573" ref_url="https://www.suse.com/security/cve/CVE-2015-5573/" source="CVE"/>
		<reference ref_id="CVE-2015-5574" ref_url="https://www.suse.com/security/cve/CVE-2015-5574/" source="CVE"/>
		<reference ref_id="CVE-2015-5575" ref_url="https://www.suse.com/security/cve/CVE-2015-5575/" source="CVE"/>
		<reference ref_id="CVE-2015-5576" ref_url="https://www.suse.com/security/cve/CVE-2015-5576/" source="CVE"/>
		<reference ref_id="CVE-2015-5577" ref_url="https://www.suse.com/security/cve/CVE-2015-5577/" source="CVE"/>
		<reference ref_id="CVE-2015-5578" ref_url="https://www.suse.com/security/cve/CVE-2015-5578/" source="CVE"/>
		<reference ref_id="CVE-2015-5579" ref_url="https://www.suse.com/security/cve/CVE-2015-5579/" source="CVE"/>
		<reference ref_id="CVE-2015-5580" ref_url="https://www.suse.com/security/cve/CVE-2015-5580/" source="CVE"/>
		<reference ref_id="CVE-2015-5581" ref_url="https://www.suse.com/security/cve/CVE-2015-5581/" source="CVE"/>
		<reference ref_id="CVE-2015-5582" ref_url="https://www.suse.com/security/cve/CVE-2015-5582/" source="CVE"/>
		<reference ref_id="CVE-2015-5584" ref_url="https://www.suse.com/security/cve/CVE-2015-5584/" source="CVE"/>
		<reference ref_id="CVE-2015-5587" ref_url="https://www.suse.com/security/cve/CVE-2015-5587/" source="CVE"/>
		<reference ref_id="CVE-2015-5588" ref_url="https://www.suse.com/security/cve/CVE-2015-5588/" source="CVE"/>
		<reference ref_id="CVE-2015-6676" ref_url="https://www.suse.com/security/cve/CVE-2015-6676/" source="CVE"/>
		<reference ref_id="CVE-2015-6677" ref_url="https://www.suse.com/security/cve/CVE-2015-6677/" source="CVE"/>
		<reference ref_id="CVE-2015-6678" ref_url="https://www.suse.com/security/cve/CVE-2015-6678/" source="CVE"/>
		<reference ref_id="CVE-2015-6679" ref_url="https://www.suse.com/security/cve/CVE-2015-6679/" source="CVE"/>
		<reference ref_id="CVE-2015-6682" ref_url="https://www.suse.com/security/cve/CVE-2015-6682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<description>

Adobe Flash Player was updated to 11.2.202.521 (APSB15-23 bsc#946880) fixing several security issues:

More information can be found on:

  https://helpx.adobe.com/security/products/flash-player/apsb15-23.html

		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5567/">CVE-2015-5567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5568/">CVE-2015-5568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5570/">CVE-2015-5570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5571/">CVE-2015-5571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5572/">CVE-2015-5572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5573/">CVE-2015-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5574/">CVE-2015-5574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5575/">CVE-2015-5575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5576/">CVE-2015-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5577/">CVE-2015-5577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5578/">CVE-2015-5578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5579/">CVE-2015-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5580/">CVE-2015-5580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5581/">CVE-2015-5581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5582/">CVE-2015-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5584/">CVE-2015-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5587/">CVE-2015-5587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5588/">CVE-2015-5588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6676/">CVE-2015-6676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6677/">CVE-2015-6677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6678/">CVE-2015-6678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6679/">CVE-2015-6679</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6682/">CVE-2015-6682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78326" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="950169" ref_url="https://bugzilla.suse.com/950169" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5569" ref_url="https://www.suse.com/security/cve/CVE-2015-5569/" source="CVE"/>
		<reference ref_id="CVE-2015-7625" ref_url="https://www.suse.com/security/cve/CVE-2015-7625/" source="CVE"/>
		<reference ref_id="CVE-2015-7626" ref_url="https://www.suse.com/security/cve/CVE-2015-7626/" source="CVE"/>
		<reference ref_id="CVE-2015-7627" ref_url="https://www.suse.com/security/cve/CVE-2015-7627/" source="CVE"/>
		<reference ref_id="CVE-2015-7628" ref_url="https://www.suse.com/security/cve/CVE-2015-7628/" source="CVE"/>
		<reference ref_id="CVE-2015-7629" ref_url="https://www.suse.com/security/cve/CVE-2015-7629/" source="CVE"/>
		<reference ref_id="CVE-2015-7630" ref_url="https://www.suse.com/security/cve/CVE-2015-7630/" source="CVE"/>
		<reference ref_id="CVE-2015-7631" ref_url="https://www.suse.com/security/cve/CVE-2015-7631/" source="CVE"/>
		<reference ref_id="CVE-2015-7632" ref_url="https://www.suse.com/security/cve/CVE-2015-7632/" source="CVE"/>
		<reference ref_id="CVE-2015-7633" ref_url="https://www.suse.com/security/cve/CVE-2015-7633/" source="CVE"/>
		<reference ref_id="CVE-2015-7634" ref_url="https://www.suse.com/security/cve/CVE-2015-7634/" source="CVE"/>
		<reference ref_id="CVE-2015-7643" ref_url="https://www.suse.com/security/cve/CVE-2015-7643/" source="CVE"/>
		<reference ref_id="CVE-2015-7644" ref_url="https://www.suse.com/security/cve/CVE-2015-7644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<description>
flash-player was updated to version 11.2.202.535 to fix 13 security issues (bsc#950169).

These security issues were fixed:
- A vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-7628).
- A defense-in-depth feature in the Flash broker API (CVE-2015-5569).
- Use-after-free vulnerabilities that could lead to code execution (CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644).
- A buffer overflow vulnerability that could lead to code execution (CVE-2015-7632).
- Memory corruption vulnerabilities that could lead to code execution (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, CVE-2015-7634).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-14"/>
	<updated date="2015-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5569/">CVE-2015-5569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7625/">CVE-2015-7625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7626/">CVE-2015-7626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7627/">CVE-2015-7627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7628/">CVE-2015-7628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7629/">CVE-2015-7629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7630/">CVE-2015-7630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7631/">CVE-2015-7631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7632/">CVE-2015-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7633/">CVE-2015-7633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7634/">CVE-2015-7634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7643/">CVE-2015-7643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7644/">CVE-2015-7644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78327" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="950474" ref_url="https://bugzilla.suse.com/950474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7645" ref_url="https://www.suse.com/security/cve/CVE-2015-7645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-7645: Critical vulnerability affecting 11.2.202.535 used in Pawn Storm (APSA15-05) (bsc#950474).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-16"/>
	<updated date="2015-10-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/950474">SUSE bug 950474</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7645/">CVE-2015-7645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566553" comment="flash-player-11.2.202.540-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566554" comment="flash-player-gnome-11.2.202.540-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566555" comment="flash-player-kde4-11.2.202.540-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78328" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="954512" ref_url="https://bugzilla.suse.com/954512" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7651" ref_url="https://www.suse.com/security/cve/CVE-2015-7651/" source="CVE"/>
		<reference ref_id="CVE-2015-7652" ref_url="https://www.suse.com/security/cve/CVE-2015-7652/" source="CVE"/>
		<reference ref_id="CVE-2015-7653" ref_url="https://www.suse.com/security/cve/CVE-2015-7653/" source="CVE"/>
		<reference ref_id="CVE-2015-7654" ref_url="https://www.suse.com/security/cve/CVE-2015-7654/" source="CVE"/>
		<reference ref_id="CVE-2015-7655" ref_url="https://www.suse.com/security/cve/CVE-2015-7655/" source="CVE"/>
		<reference ref_id="CVE-2015-7656" ref_url="https://www.suse.com/security/cve/CVE-2015-7656/" source="CVE"/>
		<reference ref_id="CVE-2015-7657" ref_url="https://www.suse.com/security/cve/CVE-2015-7657/" source="CVE"/>
		<reference ref_id="CVE-2015-7658" ref_url="https://www.suse.com/security/cve/CVE-2015-7658/" source="CVE"/>
		<reference ref_id="CVE-2015-7659" ref_url="https://www.suse.com/security/cve/CVE-2015-7659/" source="CVE"/>
		<reference ref_id="CVE-2015-7660" ref_url="https://www.suse.com/security/cve/CVE-2015-7660/" source="CVE"/>
		<reference ref_id="CVE-2015-7661" ref_url="https://www.suse.com/security/cve/CVE-2015-7661/" source="CVE"/>
		<reference ref_id="CVE-2015-7662" ref_url="https://www.suse.com/security/cve/CVE-2015-7662/" source="CVE"/>
		<reference ref_id="CVE-2015-7663" ref_url="https://www.suse.com/security/cve/CVE-2015-7663/" source="CVE"/>
		<reference ref_id="CVE-2015-8042" ref_url="https://www.suse.com/security/cve/CVE-2015-8042/" source="CVE"/>
		<reference ref_id="CVE-2015-8043" ref_url="https://www.suse.com/security/cve/CVE-2015-8043/" source="CVE"/>
		<reference ref_id="CVE-2015-8044" ref_url="https://www.suse.com/security/cve/CVE-2015-8044/" source="CVE"/>
		<reference ref_id="CVE-2015-8046" ref_url="https://www.suse.com/security/cve/CVE-2015-8046/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<description>
The flash-player package was updated to fix the following security issues:

- Security update to 11.2.202.548 (bsc#954512):
  * APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,
    CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,
    CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,
    CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,
    CVE-2015-8044, CVE-2015-8046
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-11"/>
	<updated date="2015-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7651/">CVE-2015-7651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7652/">CVE-2015-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7653/">CVE-2015-7653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7654/">CVE-2015-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7655/">CVE-2015-7655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7656/">CVE-2015-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7657/">CVE-2015-7657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7658/">CVE-2015-7658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7659/">CVE-2015-7659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7660/">CVE-2015-7660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7661/">CVE-2015-7661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7662/">CVE-2015-7662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7663/">CVE-2015-7663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8042/">CVE-2015-8042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8043/">CVE-2015-8043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8044/">CVE-2015-8044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8046/">CVE-2015-8046</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78329" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="958324" ref_url="https://bugzilla.suse.com/958324" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8045" ref_url="https://www.suse.com/security/cve/CVE-2015-8045/" source="CVE"/>
		<reference ref_id="CVE-2015-8047" ref_url="https://www.suse.com/security/cve/CVE-2015-8047/" source="CVE"/>
		<reference ref_id="CVE-2015-8048" ref_url="https://www.suse.com/security/cve/CVE-2015-8048/" source="CVE"/>
		<reference ref_id="CVE-2015-8049" ref_url="https://www.suse.com/security/cve/CVE-2015-8049/" source="CVE"/>
		<reference ref_id="CVE-2015-8050" ref_url="https://www.suse.com/security/cve/CVE-2015-8050/" source="CVE"/>
		<reference ref_id="CVE-2015-8055" ref_url="https://www.suse.com/security/cve/CVE-2015-8055/" source="CVE"/>
		<reference ref_id="CVE-2015-8056" ref_url="https://www.suse.com/security/cve/CVE-2015-8056/" source="CVE"/>
		<reference ref_id="CVE-2015-8057" ref_url="https://www.suse.com/security/cve/CVE-2015-8057/" source="CVE"/>
		<reference ref_id="CVE-2015-8058" ref_url="https://www.suse.com/security/cve/CVE-2015-8058/" source="CVE"/>
		<reference ref_id="CVE-2015-8059" ref_url="https://www.suse.com/security/cve/CVE-2015-8059/" source="CVE"/>
		<reference ref_id="CVE-2015-8060" ref_url="https://www.suse.com/security/cve/CVE-2015-8060/" source="CVE"/>
		<reference ref_id="CVE-2015-8061" ref_url="https://www.suse.com/security/cve/CVE-2015-8061/" source="CVE"/>
		<reference ref_id="CVE-2015-8062" ref_url="https://www.suse.com/security/cve/CVE-2015-8062/" source="CVE"/>
		<reference ref_id="CVE-2015-8063" ref_url="https://www.suse.com/security/cve/CVE-2015-8063/" source="CVE"/>
		<reference ref_id="CVE-2015-8064" ref_url="https://www.suse.com/security/cve/CVE-2015-8064/" source="CVE"/>
		<reference ref_id="CVE-2015-8065" ref_url="https://www.suse.com/security/cve/CVE-2015-8065/" source="CVE"/>
		<reference ref_id="CVE-2015-8066" ref_url="https://www.suse.com/security/cve/CVE-2015-8066/" source="CVE"/>
		<reference ref_id="CVE-2015-8067" ref_url="https://www.suse.com/security/cve/CVE-2015-8067/" source="CVE"/>
		<reference ref_id="CVE-2015-8068" ref_url="https://www.suse.com/security/cve/CVE-2015-8068/" source="CVE"/>
		<reference ref_id="CVE-2015-8069" ref_url="https://www.suse.com/security/cve/CVE-2015-8069/" source="CVE"/>
		<reference ref_id="CVE-2015-8070" ref_url="https://www.suse.com/security/cve/CVE-2015-8070/" source="CVE"/>
		<reference ref_id="CVE-2015-8071" ref_url="https://www.suse.com/security/cve/CVE-2015-8071/" source="CVE"/>
		<reference ref_id="CVE-2015-8401" ref_url="https://www.suse.com/security/cve/CVE-2015-8401/" source="CVE"/>
		<reference ref_id="CVE-2015-8402" ref_url="https://www.suse.com/security/cve/CVE-2015-8402/" source="CVE"/>
		<reference ref_id="CVE-2015-8403" ref_url="https://www.suse.com/security/cve/CVE-2015-8403/" source="CVE"/>
		<reference ref_id="CVE-2015-8404" ref_url="https://www.suse.com/security/cve/CVE-2015-8404/" source="CVE"/>
		<reference ref_id="CVE-2015-8405" ref_url="https://www.suse.com/security/cve/CVE-2015-8405/" source="CVE"/>
		<reference ref_id="CVE-2015-8406" ref_url="https://www.suse.com/security/cve/CVE-2015-8406/" source="CVE"/>
		<reference ref_id="CVE-2015-8407" ref_url="https://www.suse.com/security/cve/CVE-2015-8407/" source="CVE"/>
		<reference ref_id="CVE-2015-8408" ref_url="https://www.suse.com/security/cve/CVE-2015-8408/" source="CVE"/>
		<reference ref_id="CVE-2015-8409" ref_url="https://www.suse.com/security/cve/CVE-2015-8409/" source="CVE"/>
		<reference ref_id="CVE-2015-8410" ref_url="https://www.suse.com/security/cve/CVE-2015-8410/" source="CVE"/>
		<reference ref_id="CVE-2015-8411" ref_url="https://www.suse.com/security/cve/CVE-2015-8411/" source="CVE"/>
		<reference ref_id="CVE-2015-8412" ref_url="https://www.suse.com/security/cve/CVE-2015-8412/" source="CVE"/>
		<reference ref_id="CVE-2015-8413" ref_url="https://www.suse.com/security/cve/CVE-2015-8413/" source="CVE"/>
		<reference ref_id="CVE-2015-8414" ref_url="https://www.suse.com/security/cve/CVE-2015-8414/" source="CVE"/>
		<reference ref_id="CVE-2015-8415" ref_url="https://www.suse.com/security/cve/CVE-2015-8415/" source="CVE"/>
		<reference ref_id="CVE-2015-8416" ref_url="https://www.suse.com/security/cve/CVE-2015-8416/" source="CVE"/>
		<reference ref_id="CVE-2015-8417" ref_url="https://www.suse.com/security/cve/CVE-2015-8417/" source="CVE"/>
		<reference ref_id="CVE-2015-8418" ref_url="https://www.suse.com/security/cve/CVE-2015-8418/" source="CVE"/>
		<reference ref_id="CVE-2015-8419" ref_url="https://www.suse.com/security/cve/CVE-2015-8419/" source="CVE"/>
		<reference ref_id="CVE-2015-8420" ref_url="https://www.suse.com/security/cve/CVE-2015-8420/" source="CVE"/>
		<reference ref_id="CVE-2015-8421" ref_url="https://www.suse.com/security/cve/CVE-2015-8421/" source="CVE"/>
		<reference ref_id="CVE-2015-8422" ref_url="https://www.suse.com/security/cve/CVE-2015-8422/" source="CVE"/>
		<reference ref_id="CVE-2015-8423" ref_url="https://www.suse.com/security/cve/CVE-2015-8423/" source="CVE"/>
		<reference ref_id="CVE-2015-8424" ref_url="https://www.suse.com/security/cve/CVE-2015-8424/" source="CVE"/>
		<reference ref_id="CVE-2015-8425" ref_url="https://www.suse.com/security/cve/CVE-2015-8425/" source="CVE"/>
		<reference ref_id="CVE-2015-8426" ref_url="https://www.suse.com/security/cve/CVE-2015-8426/" source="CVE"/>
		<reference ref_id="CVE-2015-8427" ref_url="https://www.suse.com/security/cve/CVE-2015-8427/" source="CVE"/>
		<reference ref_id="CVE-2015-8428" ref_url="https://www.suse.com/security/cve/CVE-2015-8428/" source="CVE"/>
		<reference ref_id="CVE-2015-8429" ref_url="https://www.suse.com/security/cve/CVE-2015-8429/" source="CVE"/>
		<reference ref_id="CVE-2015-8430" ref_url="https://www.suse.com/security/cve/CVE-2015-8430/" source="CVE"/>
		<reference ref_id="CVE-2015-8431" ref_url="https://www.suse.com/security/cve/CVE-2015-8431/" source="CVE"/>
		<reference ref_id="CVE-2015-8432" ref_url="https://www.suse.com/security/cve/CVE-2015-8432/" source="CVE"/>
		<reference ref_id="CVE-2015-8433" ref_url="https://www.suse.com/security/cve/CVE-2015-8433/" source="CVE"/>
		<reference ref_id="CVE-2015-8434" ref_url="https://www.suse.com/security/cve/CVE-2015-8434/" source="CVE"/>
		<reference ref_id="CVE-2015-8435" ref_url="https://www.suse.com/security/cve/CVE-2015-8435/" source="CVE"/>
		<reference ref_id="CVE-2015-8436" ref_url="https://www.suse.com/security/cve/CVE-2015-8436/" source="CVE"/>
		<reference ref_id="CVE-2015-8437" ref_url="https://www.suse.com/security/cve/CVE-2015-8437/" source="CVE"/>
		<reference ref_id="CVE-2015-8438" ref_url="https://www.suse.com/security/cve/CVE-2015-8438/" source="CVE"/>
		<reference ref_id="CVE-2015-8439" ref_url="https://www.suse.com/security/cve/CVE-2015-8439/" source="CVE"/>
		<reference ref_id="CVE-2015-8440" ref_url="https://www.suse.com/security/cve/CVE-2015-8440/" source="CVE"/>
		<reference ref_id="CVE-2015-8441" ref_url="https://www.suse.com/security/cve/CVE-2015-8441/" source="CVE"/>
		<reference ref_id="CVE-2015-8442" ref_url="https://www.suse.com/security/cve/CVE-2015-8442/" source="CVE"/>
		<reference ref_id="CVE-2015-8443" ref_url="https://www.suse.com/security/cve/CVE-2015-8443/" source="CVE"/>
		<reference ref_id="CVE-2015-8444" ref_url="https://www.suse.com/security/cve/CVE-2015-8444/" source="CVE"/>
		<reference ref_id="CVE-2015-8445" ref_url="https://www.suse.com/security/cve/CVE-2015-8445/" source="CVE"/>
		<reference ref_id="CVE-2015-8446" ref_url="https://www.suse.com/security/cve/CVE-2015-8446/" source="CVE"/>
		<reference ref_id="CVE-2015-8447" ref_url="https://www.suse.com/security/cve/CVE-2015-8447/" source="CVE"/>
		<reference ref_id="CVE-2015-8448" ref_url="https://www.suse.com/security/cve/CVE-2015-8448/" source="CVE"/>
		<reference ref_id="CVE-2015-8449" ref_url="https://www.suse.com/security/cve/CVE-2015-8449/" source="CVE"/>
		<reference ref_id="CVE-2015-8450" ref_url="https://www.suse.com/security/cve/CVE-2015-8450/" source="CVE"/>
		<reference ref_id="CVE-2015-8451" ref_url="https://www.suse.com/security/cve/CVE-2015-8451/" source="CVE"/>
		<reference ref_id="CVE-2015-8452" ref_url="https://www.suse.com/security/cve/CVE-2015-8452/" source="CVE"/>
		<reference ref_id="CVE-2015-8453" ref_url="https://www.suse.com/security/cve/CVE-2015-8453/" source="CVE"/>
		<reference ref_id="CVE-2015-8454" ref_url="https://www.suse.com/security/cve/CVE-2015-8454/" source="CVE"/>
		<reference ref_id="CVE-2015-8455" ref_url="https://www.suse.com/security/cve/CVE-2015-8455/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<description>

This update for flash-player to version 11.2.202.554 fixes the following security issues
in Adobe security advisory APSB15-32.

* These updates resolve heap buffer overflow vulnerabilities that could
  lead to code execution (CVE-2015-8438, CVE-2015-8446).
* These updates resolve memory corruption vulnerabilities that could
  lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417,
  CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045,
  CVE-2015-8418, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408).
* These updates resolve security bypass vulnerabilities (CVE-2015-8453,
  CVE-2015-8440, CVE-2015-8409).
* These updates resolve a stack overflow vulnerability that could lead
  to code execution (CVE-2015-8407).
* These updates resolve a type confusion vulnerability that could lead
  to code execution (CVE-2015-8439).
* These updates resolve an integer overflow vulnerability that could
  lead to code execution (CVE-2015-8445).
* These updates resolve a buffer overflow vulnerability that could lead
  to code execution (CVE-2015-8415)
* These updates resolve use-after-free vulnerabilities that could
  lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437,
  CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452,
  CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411,
  CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423,
  CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426,
  CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434,
  CVE-2015-8435, CVE-2015-8414, CVE-2015-8454, CVE-2015-8059, CVE-2015-8058,
  CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067,
  CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065,
  CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403,
  CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070,
  CVE-2015-8441, CVE-2015-8442, CVE-2015-8447).

Please also see
        https://helpx.adobe.com/security/products/flash-player/apsb15-32.html
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-09"/>
	<updated date="2015-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8045/">CVE-2015-8045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8047/">CVE-2015-8047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8048/">CVE-2015-8048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8049/">CVE-2015-8049</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8050/">CVE-2015-8050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8055/">CVE-2015-8055</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8056/">CVE-2015-8056</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8057/">CVE-2015-8057</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8058/">CVE-2015-8058</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8059/">CVE-2015-8059</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8060/">CVE-2015-8060</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8061/">CVE-2015-8061</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8062/">CVE-2015-8062</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8063/">CVE-2015-8063</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8064/">CVE-2015-8064</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8065/">CVE-2015-8065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8066/">CVE-2015-8066</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8067/">CVE-2015-8067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8068/">CVE-2015-8068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8069/">CVE-2015-8069</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8070/">CVE-2015-8070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8071/">CVE-2015-8071</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8401/">CVE-2015-8401</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8402/">CVE-2015-8402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8403/">CVE-2015-8403</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8404/">CVE-2015-8404</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8405/">CVE-2015-8405</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8406/">CVE-2015-8406</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8407/">CVE-2015-8407</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8408/">CVE-2015-8408</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8409/">CVE-2015-8409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8410/">CVE-2015-8410</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8411/">CVE-2015-8411</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8412/">CVE-2015-8412</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8413/">CVE-2015-8413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8414/">CVE-2015-8414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8415/">CVE-2015-8415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8416/">CVE-2015-8416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8417/">CVE-2015-8417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8418/">CVE-2015-8418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8419/">CVE-2015-8419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8420/">CVE-2015-8420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8421/">CVE-2015-8421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8422/">CVE-2015-8422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8423/">CVE-2015-8423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8424/">CVE-2015-8424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8425/">CVE-2015-8425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8426/">CVE-2015-8426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8427/">CVE-2015-8427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8428/">CVE-2015-8428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8429/">CVE-2015-8429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8430/">CVE-2015-8430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8431/">CVE-2015-8431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8432/">CVE-2015-8432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8433/">CVE-2015-8433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8434/">CVE-2015-8434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8435/">CVE-2015-8435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8436/">CVE-2015-8436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8437/">CVE-2015-8437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8438/">CVE-2015-8438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8439/">CVE-2015-8439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8440/">CVE-2015-8440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8441/">CVE-2015-8441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8442/">CVE-2015-8442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8443/">CVE-2015-8443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8444/">CVE-2015-8444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8445/">CVE-2015-8445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8446/">CVE-2015-8446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8447/">CVE-2015-8447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8448/">CVE-2015-8448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8449/">CVE-2015-8449</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8450/">CVE-2015-8450</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8451/">CVE-2015-8451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8452/">CVE-2015-8452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8453/">CVE-2015-8453</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8454/">CVE-2015-8454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8455/">CVE-2015-8455</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78330" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="960317" ref_url="https://bugzilla.suse.com/960317" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8459" ref_url="https://www.suse.com/security/cve/CVE-2015-8459/" source="CVE"/>
		<reference ref_id="CVE-2015-8460" ref_url="https://www.suse.com/security/cve/CVE-2015-8460/" source="CVE"/>
		<reference ref_id="CVE-2015-8634" ref_url="https://www.suse.com/security/cve/CVE-2015-8634/" source="CVE"/>
		<reference ref_id="CVE-2015-8635" ref_url="https://www.suse.com/security/cve/CVE-2015-8635/" source="CVE"/>
		<reference ref_id="CVE-2015-8636" ref_url="https://www.suse.com/security/cve/CVE-2015-8636/" source="CVE"/>
		<reference ref_id="CVE-2015-8638" ref_url="https://www.suse.com/security/cve/CVE-2015-8638/" source="CVE"/>
		<reference ref_id="CVE-2015-8639" ref_url="https://www.suse.com/security/cve/CVE-2015-8639/" source="CVE"/>
		<reference ref_id="CVE-2015-8640" ref_url="https://www.suse.com/security/cve/CVE-2015-8640/" source="CVE"/>
		<reference ref_id="CVE-2015-8641" ref_url="https://www.suse.com/security/cve/CVE-2015-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-8642" ref_url="https://www.suse.com/security/cve/CVE-2015-8642/" source="CVE"/>
		<reference ref_id="CVE-2015-8643" ref_url="https://www.suse.com/security/cve/CVE-2015-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-8644" ref_url="https://www.suse.com/security/cve/CVE-2015-8644/" source="CVE"/>
		<reference ref_id="CVE-2015-8645" ref_url="https://www.suse.com/security/cve/CVE-2015-8645/" source="CVE"/>
		<reference ref_id="CVE-2015-8646" ref_url="https://www.suse.com/security/cve/CVE-2015-8646/" source="CVE"/>
		<reference ref_id="CVE-2015-8647" ref_url="https://www.suse.com/security/cve/CVE-2015-8647/" source="CVE"/>
		<reference ref_id="CVE-2015-8648" ref_url="https://www.suse.com/security/cve/CVE-2015-8648/" source="CVE"/>
		<reference ref_id="CVE-2015-8649" ref_url="https://www.suse.com/security/cve/CVE-2015-8649/" source="CVE"/>
		<reference ref_id="CVE-2015-8650" ref_url="https://www.suse.com/security/cve/CVE-2015-8650/" source="CVE"/>
		<reference ref_id="CVE-2015-8651" ref_url="https://www.suse.com/security/cve/CVE-2015-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

   - CVE-2015-8644: Type confusion vulnerability that could lead to code execution.
   - CVE-2015-8651: Integer overflow vulnerability that could lead to code execution.
   - CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650: Use-after-free vulnerabilities that could lead to code execution.
   - CVE-2015-8459, CVE-2015-8460, CVE-2015-8636, CVE-2015-8645: Memory corruption vulnerabilities that could lead to code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-30"/>
	<updated date="2015-12-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8459/">CVE-2015-8459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8460/">CVE-2015-8460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8634/">CVE-2015-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8635/">CVE-2015-8635</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8636/">CVE-2015-8636</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8638/">CVE-2015-8638</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8639/">CVE-2015-8639</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8640/">CVE-2015-8640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8641/">CVE-2015-8641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8642/">CVE-2015-8642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8643/">CVE-2015-8643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8644/">CVE-2015-8644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8645/">CVE-2015-8645</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8646/">CVE-2015-8646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8647/">CVE-2015-8647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8648/">CVE-2015-8648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8649/">CVE-2015-8649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8650/">CVE-2015-8650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8651/">CVE-2015-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78331" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

CVE-2015-8327: adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).
CVE-2015-8560: fixed code execution via improper escaping of ;  (bsc#957531).   
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566565" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78332" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="916856" ref_url="https://bugzilla.suse.com/916856" source="BUGZILLA"/>
		<reference ref_id="916857" ref_url="https://bugzilla.suse.com/916857" source="BUGZILLA"/>
		<reference ref_id="916858" ref_url="https://bugzilla.suse.com/916858" source="BUGZILLA"/>
		<reference ref_id="916859" ref_url="https://bugzilla.suse.com/916859" source="BUGZILLA"/>
		<reference ref_id="916861" ref_url="https://bugzilla.suse.com/916861" source="BUGZILLA"/>
		<reference ref_id="916863" ref_url="https://bugzilla.suse.com/916863" source="BUGZILLA"/>
		<reference ref_id="916864" ref_url="https://bugzilla.suse.com/916864" source="BUGZILLA"/>
		<reference ref_id="916865" ref_url="https://bugzilla.suse.com/916865" source="BUGZILLA"/>
		<reference ref_id="916870" ref_url="https://bugzilla.suse.com/916870" source="BUGZILLA"/>
		<reference ref_id="916871" ref_url="https://bugzilla.suse.com/916871" source="BUGZILLA"/>
		<reference ref_id="916872" ref_url="https://bugzilla.suse.com/916872" source="BUGZILLA"/>
		<reference ref_id="916873" ref_url="https://bugzilla.suse.com/916873" source="BUGZILLA"/>
		<reference ref_id="916874" ref_url="https://bugzilla.suse.com/916874" source="BUGZILLA"/>
		<reference ref_id="916879" ref_url="https://bugzilla.suse.com/916879" source="BUGZILLA"/>
		<reference ref_id="916881" ref_url="https://bugzilla.suse.com/916881" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<description>

The font rendering library freetype2 has been updated to fix various 
security issues.

Security Issues:

    * CVE-2014-9656
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656&gt;
    * CVE-2014-9657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657&gt;
    * CVE-2014-9658
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658&gt;
    * CVE-2014-9660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660&gt;
    * CVE-2014-9661
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661&gt;
    * CVE-2014-9662
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662&gt;
    * CVE-2014-9667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667&gt;
    * CVE-2014-9666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666&gt;
    * CVE-2014-9665
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665&gt;
    * CVE-2014-9664
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664&gt;
    * CVE-2014-9663
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663&gt;
    * CVE-2014-9659
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659&gt;
    * CVE-2014-9668
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668&gt;
    * CVE-2014-9669
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669&gt;
    * CVE-2014-9670
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670&gt;
    * CVE-2014-9671
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671&gt;
    * CVE-2014-9672
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672&gt;
    * CVE-2014-9673
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673&gt;
    * CVE-2014-9674
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674&gt;
    * CVE-2014-9675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566566" comment="freetype2-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566567" comment="freetype2-32bit-2.3.7-25.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566568" comment="ft2demos-2.3.7-25.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78333" version="1" class="patch">
	<metadata>
		<title>Security update for FUSE</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="931452" ref_url="https://bugzilla.suse.com/931452" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001429.html" source="SUSE-SU"/>
		<description>

This update for FUSE fixes the following security issue:

    * CVE-2015-3202: FUSE did not clear the environment upon execution of
      external programs.

Security Issues:

    * CVE-2015-3202
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-20"/>
	<updated date="2015-05-20"/>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566569" comment="fuse-2.8.7-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566570" comment="libfuse2-2.8.7-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78334" version="1" class="patch">
	<metadata>
		<title>Security update for gd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="923945" ref_url="https://bugzilla.suse.com/923945" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001373.html" source="SUSE-SU"/>
		<description>

The graphics drawing library gd has been updated to fix one security issue:

    * possible buffer read overflow (CVE-2014-9709)

Security Issues:

    * CVE-2014-9709
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-24"/>
	<updated date="2015-03-24"/>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566571" comment="gd-2.0.36.RC1-52.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78335" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566572" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566573" comment="giflib-32bit-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78336" version="1" class="patch">
	<metadata>
		<title>Security update for gimp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="791372" ref_url="https://bugzilla.suse.com/791372" source="BUGZILLA"/>
		<reference ref_id="853423" ref_url="https://bugzilla.suse.com/853423" source="BUGZILLA"/>
		<reference ref_id="853425" ref_url="https://bugzilla.suse.com/853425" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-5576" ref_url="https://www.suse.com/security/cve/CVE-2012-5576/" source="CVE"/>
		<reference ref_id="CVE-2013-1913" ref_url="https://www.suse.com/security/cve/CVE-2013-1913/" source="CVE"/>
		<reference ref_id="CVE-2013-1978" ref_url="https://www.suse.com/security/cve/CVE-2013-1978/" source="CVE"/>
		<description>

This update fixes the following security issues with gimp:

    * bnc#853423: XWD plugin g_new() integer overflow (CVE-2013-1913)
    * bnc#853425: XWD plugin color map heap-based buffer overflow
      (CVE-2013-1978)
    * bnc#791372: memory corruption via XWD files (CVE-2012-5576)

Security Issue references:

    * CVE-2013-1913
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1913&gt;
    * CVE-2012-5576
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576&gt;
    * CVE-2013-1978
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-03"/>
	<updated date="2014-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/791372">SUSE bug 791372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853423">SUSE bug 853423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853425">SUSE bug 853425</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5576/">CVE-2012-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1913/">CVE-2013-1913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1978/">CVE-2013-1978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566574" comment="gimp-2.6.2-3.34.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566575" comment="gimp-lang-2.6.2-3.34.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566576" comment="gimp-plugins-python-2.6.2-3.34.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78337" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="888347" ref_url="https://bugzilla.suse.com/888347" source="BUGZILLA"/>
		<reference ref_id="892065" ref_url="https://bugzilla.suse.com/892065" source="BUGZILLA"/>
		<reference ref_id="892073" ref_url="https://bugzilla.suse.com/892073" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<description>

This glibc update fixes a critical privilege escalation problem and two 
non-security issues:

    * bnc#892073: An off-by-one error leading to a heap-based buffer
      overflow was found in __gconv_translit_find(). An exploit that
      targets the problem is publicly available. (CVE-2014-5119)
    * bnc#892065: setenv-alloca.patch: Avoid unbound alloca in setenv.
    * bnc#888347: printf-multibyte-format.patch: Don't parse %s format
      argument as multi-byte string.

Security Issues:

    * CVE-2014-5119
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-29"/>
	<updated date="2014-08-29"/>
	<bugzilla href="https://bugzilla.suse.com/888347">SUSE bug 888347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892065">SUSE bug 892065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566577" comment="glibc-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566578" comment="glibc-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566579" comment="glibc-devel-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566580" comment="glibc-devel-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566581" comment="glibc-i18ndata-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566582" comment="glibc-locale-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566583" comment="glibc-locale-32bit-2.11.3-17.72.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566584" comment="nscd-2.11.3-17.72.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78338" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="851280" ref_url="https://bugzilla.suse.com/851280" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="932059" ref_url="https://bugzilla.suse.com/932059" source="BUGZILLA"/>
		<reference ref_id="933770" ref_url="https://bugzilla.suse.com/933770" source="BUGZILLA"/>
		<reference ref_id="933903" ref_url="https://bugzilla.suse.com/933903" source="BUGZILLA"/>
		<reference ref_id="935286" ref_url="https://bugzilla.suse.com/935286" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<description>
This update for glibc provides fixes for security and non-security issues.

These security issues have been fixed:

- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed
  local users to change the permission on the files and obtain access to arbitrary
  pseudo-terminals by leveraging a FUSE file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a
  file is open, which allowed remote attackers to cause a denial of service (infinite loop)
  by performing a look-up while the database is iterated over the database, which triggers
  the file pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)

These non-security issues have been fixed:

- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851280">SUSE bug 851280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932059">SUSE bug 932059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933770">SUSE bug 933770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933903">SUSE bug 933903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935286">SUSE bug 935286</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566585" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566586" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566587" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566588" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566589" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566590" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566591" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566592" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78339" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="930721" ref_url="https://bugzilla.suse.com/930721" source="BUGZILLA"/>
		<reference ref_id="942317" ref_url="https://bugzilla.suse.com/942317" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="956988" ref_url="https://bugzilla.suse.com/956988" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#930721: Accept leading and trailing spaces in getdate input string
- bsc#942317: Recognize power8 platform 
- bsc#950944: Always enable pointer guard
- bsc#956988: Fix deadlock in __dl_iterate_phdr
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930721">SUSE bug 930721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942317">SUSE bug 942317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956988">SUSE bug 956988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566593" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566594" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566595" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566596" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566597" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566598" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566599" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566600" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78340" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="880730" ref_url="https://bugzilla.suse.com/880730" source="BUGZILLA"/>
		<reference ref_id="880910" ref_url="https://bugzilla.suse.com/880910" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
		<description>

GnuTLS has been patched to ensure proper parsing of session ids during the 
TLS/SSL handshake. Additionally, three issues inherited from libtasn1 have 
been fixed.

Further information is available at 
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
&lt;http://www.gnutls.org/security.html#GNUTLS-SA-2014-3&gt;

These security issues have been fixed:

    * Possible memory corruption during connect (CVE-2014-3466)
    * Multiple boundary check issues could allow DoS (CVE-2014-3467)
    * asn1_get_bit_der() can return negative bit length (CVE-2014-3468)
    * Possible DoS by NULL pointer dereference (CVE-2014-3469)

Security Issue references:

    * CVE-2014-3466
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-03"/>
	<updated date="2014-06-03"/>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566601" comment="gnutls-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566602" comment="libgnutls26-2.4.1-24.39.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566603" comment="libgnutls26-32bit-2.4.1-24.39.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78341" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566604" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566605" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566606" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78342" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566607" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566608" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566609" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78343" version="1" class="patch">
	<metadata>
		<title>Security update for GPG2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="884130" ref_url="https://bugzilla.suse.com/884130" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617/" source="CVE"/>
		<description>

GPG2 has been updated to fix a possible denial of service.

This security issue has been fixed:

    * Denial of service through infinite loop with garbled compressed data
      packets (CVE-2014-4617)

Security Issues:

    * CVE-2014-4617
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-26"/>
	<updated date="2014-06-26"/>
	<bugzilla href="https://bugzilla.suse.com/884130">SUSE bug 884130</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566610" comment="gpg2-2.0.9-25.33.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566611" comment="gpg2-lang-2.0.9-25.33.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78344" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<description>

This update for gpg2 fixes the following issues: 

- Fix cve-2015-1606 (bsc#918089)
  * Invalid memory read using a garbled keyring
  * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch
- Fix cve-2015-1607 (bsc#918090)
  * Memcpy with overlapping ranges
  * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566612" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566613" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78345" version="1" class="patch">
	<metadata>
		<title>Security update for gpgme</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="890123" ref_url="https://bugzilla.suse.com/890123" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564/" source="CVE"/>
		<description>

This gpgme update fixes the following security issue:

    * bnc#890123: Fix possible overflow in gpgsm and uiserver engines
      (CVE-2014-3564)

Security Issues:

    * CVE-2014-3564
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-22"/>
	<updated date="2014-08-22"/>
	<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566614" comment="gpgme-1.1.6-25.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566615" comment="libgpgme11-1.1.6-25.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78346" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="884828" ref_url="https://bugzilla.suse.com/884828" source="BUGZILLA"/>
		<reference ref_id="884830" ref_url="https://bugzilla.suse.com/884830" source="BUGZILLA"/>
		<reference ref_id="946148" ref_url="https://bugzilla.suse.com/946148" source="BUGZILLA"/>
		<reference ref_id="952539" ref_url="https://bugzilla.suse.com/952539" source="BUGZILLA"/>
		<reference ref_id="954592" ref_url="https://bugzilla.suse.com/954592" source="BUGZILLA"/>
		<reference ref_id="956631" ref_url="https://bugzilla.suse.com/956631" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00040.html" source="SUSE-SU"/>
		<description>
This update for grub2 provides the following fixes:

A security issues with a bufferoverflow when reading username and password was fixed (bsc#956631, CVE-2015-8370)

Bugs fixed:
- Expand list of grub.cfg search path in PV Xen guests for systems installed on btrfs
  snapshots. (bsc#946148, bsc#952539)
- Add grub.xen config searching path on boot partition. (bsc#884828)
- Add linux16 and initrd16 to grub.xen. (bsc#884830)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/884828">SUSE bug 884828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884830">SUSE bug 884830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946148">SUSE bug 946148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952539">SUSE bug 952539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954592">SUSE bug 954592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566616" comment="grub2-x86_64-efi-2.00-0.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566617" comment="grub2-x86_64-xen-2.00-0.49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78347" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-0_10-plugins-bad</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="927559" ref_url="https://bugzilla.suse.com/927559" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0921-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00017.html" source="SUSE-SU"/>
		<description>

gstreamer-0_10-plugins-bad was updated to fix a security issue, a buffer 
overflow in mp4 parsing (bnc#927559 CVE-2015-0797).

Security Issues:

    * CVE-2015-0797
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-27"/>
	<updated date="2015-04-27"/>
	<bugzilla href="https://bugzilla.suse.com/927559">SUSE bug 927559</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566618" comment="gstreamer-0_10-plugins-bad-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566619" comment="gstreamer-0_10-plugins-bad-lang-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566620" comment="libgstbasecamerabinsrc-0_10-0-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566621" comment="libgstbasecamerabinsrc-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566622" comment="libgstbasevideo-0_10-0-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566623" comment="libgstbasevideo-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566624" comment="libgstphotography-0_10-0-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566625" comment="libgstphotography-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566626" comment="libgstsignalprocessor-0_10-0-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566627" comment="libgstsignalprocessor-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566628" comment="libgstvdp-0_10-0-0.10.22-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566629" comment="libgstvdp-0_10-0-32bit-0.10.22-7.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78348" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="922741" ref_url="https://bugzilla.suse.com/922741" source="BUGZILLA"/>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<description>
gtk2 was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801).
- CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791).

This non-security issue was fixed:
- Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922741">SUSE bug 922741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566630" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566631" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566632" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78349" version="1" class="patch">
	<metadata>
		<title>Security update for gdk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<description>
This update for gdk2 fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issues were fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-29"/>
	<updated date="2016-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566633" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566634" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566635" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78350" version="1" class="patch">
	<metadata>
		<title>Security update for hplip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="808355" ref_url="https://bugzilla.suse.com/808355" source="BUGZILLA"/>
		<reference ref_id="835827" ref_url="https://bugzilla.suse.com/835827" source="BUGZILLA"/>
		<reference ref_id="836937" ref_url="https://bugzilla.suse.com/836937" source="BUGZILLA"/>
		<reference ref_id="852368" ref_url="https://bugzilla.suse.com/852368" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-0200" ref_url="https://www.suse.com/security/cve/CVE-2013-0200/" source="CVE"/>
		<reference ref_id="CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325/" source="CVE"/>
		<reference ref_id="CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402/" source="CVE"/>
		<description>

hplip was updated to fix three security issues:

    * 

      CVE-2013-0200: Some local file overwrite problems via predictable
      /tmp filenames were fixed.

    * 

      CVE-2013-4325: hplip used an insecure polkit DBUS API (polkit-process
      subject race condition) which could lead to local privilege
      escalation.

    * 

      CVE-2013-6402: hplip uses arbitrary file creation/overwrite (via
      hardcoded file name /tmp/hp-pkservice.log).

Security Issue references:

    * CVE-2013-4325
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325&gt;
    * CVE-2013-0200
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200&gt;
    * CVE-2013-6402
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-17"/>
	<updated date="2014-01-17"/>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0200/">CVE-2013-0200</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566017" comment="hplip-3.11.10-0.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566018" comment="hplip-hpijs-3.11.10-0.6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78351" version="1" class="patch">
	<metadata>
		<title>Security update for icedtea-web</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="864364" ref_url="https://bugzilla.suse.com/864364" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6493" ref_url="https://www.suse.com/security/cve/CVE-2013-6493/" source="CVE"/>
		<description>

The OpenJDK Java Plugin IcedTea Web was released to fix a temporary file 
access problem.

Changes:

    * Dialogs center on screen before becoming visible.
    * Support for u45 new manifest attributes (Application-Name).
    * Custom applet permission policies panel in itweb-settings control
      panel.
    * Plugin fixes:
          o PR1271: icedtea-web does not handle 'javascript:'-protocol URLs
          o RH976833: Multiple applets on one page cause deadlock
          o Enabled javaconsole.
    * Security fixes:
          o CVE-2013-6493/RH1010958: Insecure temporary file use flaw in
            LiveConnect implementation.
    * Additional fixes and changes:
          o Christmas splashscreen extension
          o Fixed classloading deadlocks
          o Cleaned code from warnings
          o Pipes moved to XDG runtime dir.

Security Issue references:

    * CVE-2013-6493
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6493&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-04"/>
	<updated date="2014-03-04"/>
	<bugzilla href="https://bugzilla.suse.com/864364">SUSE bug 864364</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6493/">CVE-2013-6493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566636" comment="icedtea-web-1.4.2-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78352" version="1" class="patch">
	<metadata>
		<title>Security update for icu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001463.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issue in icu:

    * CVE-2014-9654: insufficient size limit checks in regular expression
      compiler (bsc#917129)

Security Issues:

    * CVE-2014-9654
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-18"/>
	<updated date="2015-06-18"/>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563371" comment="icu-4.0-7.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566637" comment="libicu-4.0-7.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78353" version="1" class="patch">
	<metadata>
		<title>Security update for jasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="909474" ref_url="https://bugzilla.suse.com/909474" source="BUGZILLA"/>
		<reference ref_id="909475" ref_url="https://bugzilla.suse.com/909475" source="BUGZILLA"/>
		<reference ref_id="911837" ref_url="https://bugzilla.suse.com/911837" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<description>

This update for jasper fixes the following security issues:

    * 

      CVE-2014-8137: Double free in jas_iccattrval_destroy(). Double call
      to free() allowed attackers to cause a denial of service or possibly
      have unspecified other impact via unknown vectors. (bsc#909474)

    * 

      CVE-2014-8138: Heap overflow in jas_decode(). This could be used to
      do an arbitrary write and could result in arbitrary code execution.
      (bsc#909475)

    * 

      CVE-2014-8157: Off-by-one error in the jpc_dec_process_sot(). Could
      allow remote attackers to cause a denial of service (crash) or
      possibly execute arbitrary code via a crafted JPEG 2000 image, which
      triggers a heap-based buffer overflow. (bsc#911837)

    * 

      CVE-2014-8158: Multiple stack-based buffer overflows in jpc_qmfb.c.
      Could allow remote attackers to cause a denial of service (crash) or
      possibly execute arbitrary code via a crafted JPEG 2000 image.
      (bsc#911837)

Security Issues:

    * CVE-2014-8138
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138&gt;
    * CVE-2014-8137
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137&gt;
    * CVE-2014-8157
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157&gt;
    * CVE-2014-8158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-03"/>
	<updated date="2015-02-03"/>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566638" comment="libjasper-1.900.1-134.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566639" comment="libjasper-32bit-1.900.1-134.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78354" version="1" class="patch">
	<metadata>
		<title>Security update for Java OpenJDK</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="901242" ref_url="https://bugzilla.suse.com/901242" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6468" ref_url="https://www.suse.com/security/cve/CVE-2014-6468/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6485" ref_url="https://www.suse.com/security/cve/CVE-2014-6485/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517/" source="CVE"/>
		<reference ref_id="CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-6562" ref_url="https://www.suse.com/security/cve/CVE-2014-6562/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<description>

Oracle Critical Patch Update Advisory - October 2014

Description:

A Critical Patch Update (CPU) is a collection of patches for multiple 
security vulnerabilities.

Find more information here: 
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
&lt;http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-24"/>
	<updated date="2014-10-24"/>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6468/">CVE-2014-6468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6485/">CVE-2014-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6562/">CVE-2014-6562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566640" comment="java-1_7_0-openjdk-1.7.0.71-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566641" comment="java-1_7_0-openjdk-demo-1.7.0.71-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566642" comment="java-1_7_0-openjdk-devel-1.7.0.71-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78355" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="938248" ref_url="https://bugzilla.suse.com/938248" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2596" ref_url="https://www.suse.com/security/cve/CVE-2015-2596/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<description>
OpenJDK was updated to 2.6.1 - OpenJDK 7u85 to fix security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2596: Difficult to exploit vulnerability in the Hotspot component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data.
* CVE-2015-2597: Easily exploitable vulnerability in the Install component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2613: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.
* CVE-2015-2619: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2627: Very difficult to exploit vulnerability in the Install component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2628: Easily exploitable vulnerability in the CORBA component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. 
* CVE-2015-4729: Very difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java SE accessible data as well as read access to a subset of Java SE accessible data.
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4736: Difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-22"/>
	<updated date="2015-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2596/">CVE-2015-2596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78356" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="951376" ref_url="https://bugzilla.suse.com/951376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u91 to fix 17 security issues.

These security issues were fixed:
- CVE-2015-4843: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries (bsc#951376).
- CVE-2015-4842: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to JAXP (bsc#951376).
- CVE-2015-4840: Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#951376).
- CVE-2015-4872: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect integrity via unknown vectors related to Security (bsc#951376).
- CVE-2015-4860: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883 (bsc#951376).
- CVE-2015-4844: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#951376).
- CVE-2015-4883: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860 (bsc#951376).
- CVE-2015-4893: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911 (bsc#951376).
- CVE-2015-4911: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893 (bsc#951376).
- CVE-2015-4882: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect availability via vectors related to CORBA (bsc#951376).
- CVE-2015-4881: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835 (bsc#951376).
- CVE-2015-4734: Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to JGSS (bsc#951376).
- CVE-2015-4806: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries (bsc#951376).
- CVE-2015-4805: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization (bsc#951376).
- CVE-2015-4803: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911 (bsc#951376).
- CVE-2015-4835: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881 (bsc#951376).
- CVE-2015-4903: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to RMI (bsc#951376).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-23"/>
	<updated date="2015-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78357" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="960996" ref_url="https://bugzilla.suse.com/960996" source="BUGZILLA"/>
		<reference ref_id="962743" ref_url="https://bugzilla.suse.com/962743" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u95 to fix 9 security issues. (bsc#962743)

- CVE-2015-4871: Rebinding of the receiver of a DirectMethodHandle may allow a protected method to be accessed
- CVE-2015-7575: Further reduce use of MD5 (SLOTH) (bsc#960996)
- CVE-2015-8126: Vulnerability in the AWT component related to splashscreen displays
- CVE-2015-8472: Vulnerability in the AWT component, addressed by same fix
- CVE-2016-0402: Vulnerability in the Networking component related to URL processing
- CVE-2016-0448: Vulnerability in the JMX comonent related to attribute processing
- CVE-2016-0466: Vulnerability in the JAXP component, related to limits
- CVE-2016-0483: Vulnerability in the AWT component related to image decoding
- CVE-2016-0494: Vulnerability in 2D component related to font actions
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78358" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="829857" ref_url="https://bugzilla.suse.com/829857" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4132" ref_url="https://www.suse.com/security/cve/CVE-2013-4132/" source="CVE"/>
		<reference ref_id="CVE-2013-4133" ref_url="https://www.suse.com/security/cve/CVE-2013-4133/" source="CVE"/>
		<description>

This kdebase4-workspace update fixes two security issues:

    * NULL pointer dereference in KDM and KCheckPass. (CVE-2013-4132)
    * Memory leak that could lead to a denial of service. (CVE-2013-4133)

Security Issues references:

    * CVE-2013-4132
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4132&gt;
    * CVE-2013-4133
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4133&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/829857">SUSE bug 829857</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4132/">CVE-2013-4132</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4133/">CVE-2013-4133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566652" comment="kde4-kgreeter-plugins-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566653" comment="kdebase4-wallpapers-4.3.5-0.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566654" comment="kdebase4-workspace-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566655" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566656" comment="kdm-4.3.5-0.12.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566657" comment="kwin-4.3.5-0.12.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78359" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-runtime</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="857200" ref_url="https://bugzilla.suse.com/857200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7252" ref_url="https://www.suse.com/security/cve/CVE-2013-7252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001292.html" source="SUSE-SU"/>
		<description>

kdebase4-runtime has been updated to fix one security issue:

    * CVE-2013-7252: Added gpg based encryption support to kwallet
      (bnc#857200).

Security Issues:

    * CVE-2013-7252
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7252&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/857200">SUSE bug 857200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7252/">CVE-2013-7252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566658" comment="kde4-l10n-ar-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566659" comment="kde4-l10n-cs-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566660" comment="kde4-l10n-da-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566661" comment="kde4-l10n-da-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566662" comment="kde4-l10n-da-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566663" comment="kde4-l10n-de-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563389" comment="kde4-l10n-de-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563390" comment="kde4-l10n-de-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566664" comment="kde4-l10n-en_GB-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566665" comment="kde4-l10n-es-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566666" comment="kde4-l10n-es-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566667" comment="kde4-l10n-es-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566668" comment="kde4-l10n-fr-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566669" comment="kde4-l10n-fr-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566670" comment="kde4-l10n-fr-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566671" comment="kde4-l10n-hu-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566672" comment="kde4-l10n-it-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566673" comment="kde4-l10n-it-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566674" comment="kde4-l10n-it-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566675" comment="kde4-l10n-ja-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566676" comment="kde4-l10n-ko-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566677" comment="kde4-l10n-nb-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566678" comment="kde4-l10n-nl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566679" comment="kde4-l10n-nl-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566680" comment="kde4-l10n-nl-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566681" comment="kde4-l10n-pl-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566682" comment="kde4-l10n-pl-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566683" comment="kde4-l10n-pl-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566684" comment="kde4-l10n-pt-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566685" comment="kde4-l10n-pt_BR-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566686" comment="kde4-l10n-pt_BR-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566687" comment="kde4-l10n-pt_BR-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566688" comment="kde4-l10n-ru-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566689" comment="kde4-l10n-ru-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566690" comment="kde4-l10n-ru-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566691" comment="kde4-l10n-sv-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566692" comment="kde4-l10n-sv-data-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566693" comment="kde4-l10n-sv-doc-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566694" comment="kde4-l10n-zh_CN-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566695" comment="kde4-l10n-zh_TW-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566696" comment="kdebase4-runtime-4.3.5-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566697" comment="kdebase4-runtime-xine-4.3.5-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78360" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566698" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566700" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566701" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566702" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566703" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78361" version="1" class="patch">
	<metadata>
		<title>Security update for kdelibs4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<description>

This update of the kdelibs4 KSSL interface makes it select a set of default 
ciphers that is recommended for current usage. This update is needed for 
Konqueror to restrict its cipher set when using https.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566704" comment="kdelibs4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566705" comment="kdelibs4-core-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566706" comment="libkde4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563393" comment="libkde4-32bit-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566707" comment="libkdecore4-4.3.5-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563395" comment="libkdecore4-32bit-4.3.5-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78362" version="1" class="patch">
	<metadata>
		<title>Security update for kdirstat</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="868682" ref_url="https://bugzilla.suse.com/868682" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2527" ref_url="https://www.suse.com/security/cve/CVE-2014-2527/" source="CVE"/>
		<reference ref_id="CVE-2014-2528" ref_url="https://www.suse.com/security/cve/CVE-2014-2528/" source="CVE"/>
		<description>

The following security issue has been fixed:

    * #868682: CVE-2014-2527 CVE-2014-2528: kdirstat: command injection in
      kcleanup

Security Issues:

    * CVE-2014-2527
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2527&gt;
    * CVE-2014-2528
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2528&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-06"/>
	<updated date="2014-07-06"/>
	<bugzilla href="https://bugzilla.suse.com/868682">SUSE bug 868682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2527/">CVE-2014-2527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2528/">CVE-2014-2528</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566708" comment="kdirstat-2.4.4-255.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78363" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="833820" ref_url="https://bugzilla.suse.com/833820" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="871134" ref_url="https://bugzilla.suse.com/871134" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="879304" ref_url="https://bugzilla.suse.com/879304" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="880892" ref_url="https://bugzilla.suse.com/880892" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883096" ref_url="https://bugzilla.suse.com/883096" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887418" ref_url="https://bugzilla.suse.com/887418" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891281" ref_url="https://bugzilla.suse.com/891281" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="891746" ref_url="https://bugzilla.suse.com/891746" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="895221" ref_url="https://bugzilla.suse.com/895221" source="BUGZILLA"/>
		<reference ref_id="895608" ref_url="https://bugzilla.suse.com/895608" source="BUGZILLA"/>
		<reference ref_id="895680" ref_url="https://bugzilla.suse.com/895680" source="BUGZILLA"/>
		<reference ref_id="895983" ref_url="https://bugzilla.suse.com/895983" source="BUGZILLA"/>
		<reference ref_id="896689" ref_url="https://bugzilla.suse.com/896689" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<reference ref_id="CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix 
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

CVE-2014-3153 The futex_requeue function in kernel/futex.c in the Linux 
kernel through 3.14.5 does not ensure that calls have two different futex 
addresses, which allows local users to gain privileges via a crafted 
FUTEX_REQUEUE command that facilitates unsafe waiter modification. 
(bnc#880892)

CVE-2014-6410: Avoid infinite loop when processing indirect ICBs 
(bnc#896689)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - ALSA: hda - Enabling Realtek ALC 671 codec 
(bnc#891746). - Add option to automatically enforce module signatures when 
in Secure Boot mode (bnc#884333). - Add secure_modules() call (bnc#884333). 
- Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344). - Backported 
new patches of Lock down functions for UEFI secure boot Also updated 
series.conf and removed old patches. - Btrfs: Return EXDEV for cross file 
system snapshot. - Btrfs: abort the transaction when we does not find our 
extent ref. - Btrfs: avoid warning bomb of btrfs_invalidate_inodes. - 
Btrfs: cancel scrub on transaction abortion. - Btrfs: correctly set profile 
flags on seqlock retry. - Btrfs: does not check nodes for extent items. - 
Btrfs: fix a possible deadlock between scrub and transaction committing. - 
Btrfs: fix corruption after write/fsync failure + fsync + log recovery 
(bnc#894200). - Btrfs: fix csum tree corruption, duplicate and outdated 
checksums (bnc#891619). - Btrfs: fix double free in 
find_lock_delalloc_range. - Btrfs: fix possible memory leak in 
btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - Update x86_64 config 
files: re-enable SENSORS_W83627EHF (bnc#891281) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: AST2000 cannot be detected 
correctly (bnc#895983). - drm/ast: Actually load DP501 firmware when 
required (bnc#895608 bnc#871134). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/ast: initial DP501 support (v0.2) 
(bnc#871134). - drm/ast: open key before detect chips (bnc#895983). - 
drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304). - 
drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064). - 
drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init (bnc#869055). - 
drm/i915: create functions for the 'unclaimed register' checks 
(bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed register' checks 
(bnc#869055). - drm/mgag200: Initialize data needed to map fbdev memory 
(bnc #806990). - e1000e: enable support for new device IDs (bnc#885509). - 
fs/fscache: remove spin_lock() from the condition in while() (bnc#880344). 
- hibernate: Disable in a signed modules environment (bnc#884333). - 
hugetlb: does not use ERR_PTR with VM_FAULT* values - ibmvscsi: Abort init 
sequence during error recovery (bnc#885382). - ibmvscsi: Add memory 
barriers for send / receive (bnc#885382). - inet: add a redirect generation 
id in inetpeer (bnc#860593). - inetpeer: initialize -&gt;redirect_genid in 
inet_getpeer() (bnc#860593). - ipv6: tcp: fix tcp_v6_conn_request() 
(bnc#887645). - kabi: hide bnc#860593 changes of struct inetpeer_addr_base 
(bnc#860593). - kernel: 3215 tty hang (bnc#891087, LTC#114562). - kernel: 
fix data corruption when reading /proc/sysinfo (bnc#891087, LTC#114480). - 
kernel: fix kernel oops with load of fpc register (bnc#889061, LTC#113596). 
- kernel: sclp console tty reference counting (bnc#891087, LTC#115466). - 
kexec: Disable at runtime if the kernel enforces module loading 
restrictions (bnc#884333). - md/raid6: avoid data corruption during 
recovery of double-degraded RAID6. - memcg, vmscan: Fix forced scan of 
anonymous pages (memory reclaim fix). - memcg: do not expose uninitialized 
mem_cgroup_per_node to world (bnc#883096). - mm, hugetlb: add VM_NORESERVE 
check in vma_has_reserves() - mm, hugetlb: change variable name 
reservations to resv - mm, hugetlb: decrement reserve count if VM_NORESERVE 
alloc page cache - mm, hugetlb: defer freeing pages when gathering surplus 
pages - mm, hugetlb: do not use a page in page cache for cow optimization - 
mm, hugetlb: fix and clean-up node iteration code to alloc or free - mm, 
hugetlb: fix race in region tracking - mm, hugetlb: fix subpool accounting 
handling - mm, hugetlb: improve page-fault scalability - mm, hugetlb: 
improve, cleanup resv_map parameters - mm, hugetlb: move up the code which 
check availability of free huge page - mm, hugetlb: protect reserved pages 
when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - pagecache_limit: batch large nr_to_scan targets 
(bnc#895221). - pagecachelimit: reduce lru_lock congestion for heavy 
parallel reclaim fix (bnc#895680). - perf/core: Add weighted samples 
(bnc#876114). - perf/x86: Add flags to event constraints (bnc#876114). - 
perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114). - perf: 
Add generic memory sampling interface (bnc#876114). - qla2xxx: Avoid 
escalating the SCSI error handler if the command is not found in firmware 
(bnc#859840). - qla2xxx: Clear loop_id for ports that are marked lost 
during fabric scanning (bnc#859840). - qla2xxx: Does not check for firmware 
hung during the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue 
abort command for outstanding commands during cleanup when only firmware is 
alive (bnc#859840). - qla2xxx: Reduce the time we wait for a command to 
complete during SCSI error handling (bnc#859840). - qla2xxx: Set host 
can_queue value based on available resources (bnc#859840). - restore 
smp_mb() in unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy 
IOTLB flushing for DMA unmap (bnc#889061, LTC#113725). - sched: fix the 
theoretical signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: 
Enable integrated ASCII console per default (bnc#885262, LTC#112035). - 
scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - writeback: Do not sync data dirtied after sync start 
(bnc#833820). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86, cpu hotplug: Fix 
stack frame warning in check_irq_vectors_for_cpu_disable() (bnc#887418). - 
x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add 
kdump to UV NMI handler (bnc#888847). - x86/UV: Add summary of cpu activity 
to UV NMI handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - 
x86/UV: Update UV support for external NMI signals (bnc#888847). - 
x86/uv/nmi: Fix Sparse warnings (bnc#888847). - x86: Add check for number 
of available vectors before CPU down (bnc#887418). - x86: Lock down IO port 
access when module security is enabled (bnc#884333). - x86: Restrict MSR 
access when module loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-24"/>
	<updated date="2014-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833820">SUSE bug 833820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871134">SUSE bug 871134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879304">SUSE bug 879304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883096">SUSE bug 883096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887418">SUSE bug 887418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891281">SUSE bug 891281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891746">SUSE bug 891746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895221">SUSE bug 895221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895608">SUSE bug 895608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895680">SUSE bug 895680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895983">SUSE bug 895983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566709" comment="kernel-bigsmp-devel-3.0.101-0.47.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566710" comment="kernel-default-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566711" comment="kernel-default-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566712" comment="kernel-default-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566713" comment="kernel-default-extra-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566714" comment="kernel-pae-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566715" comment="kernel-pae-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566716" comment="kernel-pae-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566717" comment="kernel-pae-extra-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566718" comment="kernel-source-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566719" comment="kernel-syms-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566720" comment="kernel-trace-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566721" comment="kernel-xen-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566722" comment="kernel-xen-base-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566723" comment="kernel-xen-devel-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566724" comment="kernel-xen-extra-3.0.101-0.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566725" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566726" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.7.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78364" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="851068" ref_url="https://bugzilla.suse.com/851068" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="927786" ref_url="https://bugzilla.suse.com/927786" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930761" ref_url="https://bugzilla.suse.com/930761" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931538" ref_url="https://bugzilla.suse.com/931538" source="BUGZILLA"/>
		<reference ref_id="932348" ref_url="https://bugzilla.suse.com/932348" source="BUGZILLA"/>
		<reference ref_id="932458" ref_url="https://bugzilla.suse.com/932458" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="933936" ref_url="https://bugzilla.suse.com/933936" source="BUGZILLA"/>
		<reference ref_id="934742" ref_url="https://bugzilla.suse.com/934742" source="BUGZILLA"/>
		<reference ref_id="934944" ref_url="https://bugzilla.suse.com/934944" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP3 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:

- CVE-2015-5707: An integer overflow in the SCSI generic driver could
  be potentially used by local attackers to crash the kernel or execute
  code (bsc#940338).
- CVE-2015-5364: A remote denial of service (hang) via UDP flood with
  incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-5366: A remote denial of service (unexpected error returns)
  via UDP flood with incorrect package checksums was fixed. (bsc#936831).
- CVE-2015-1420: A race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel allowed local users to bypass intended
  size restrictions and trigger read operations on additional memory
  locations by changing the handle_bytes value of a file handle during
  the execution of this function (bnc#915517).
- CVE-2015-4700: A local user could have created a bad instruction in
  the JIT processed BPF code, leading to a kernel crash (bnc#935705).
- CVE-2015-4167: The UDF filesystem in the Linux kernel was vulnerable
  to a crash which could occur while fetching inode information from a
  corrupted/malicious udf file system image. (bsc#933907).
- CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731: Various
  issues in handling UDF filesystems in the Linux kernel allowed the
  corruption of kernel memory and other issues. An attacker able to mount
  a corrupted/malicious UDF file system image could cause the kernel to
  crash. (bsc#933904 bsc#933896)
- CVE-2015-2150: The Linux kernel did not properly restrict access to
  PCI command registers, which might have allowed local guest users to
  cause a denial of service (non-maskable interrupt and host crash) by
  disabling the (1) memory or (2) I/O decoding for a PCI Express device
  and then accessing the device, which triggers an Unsupported Request
  (UR) response (bsc#919463).
- CVE-2015-0777: drivers/xen/usbback/usbback.c as used in the Linux
  kernel 2.6.x and 3.x in SUSE Linux distributions, allowed guest OS users
  to obtain sensitive information from uninitialized locations in host OS
  kernel memory via unspecified vectors (bnc#917830).
- CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel did
  not prevent the TS_COMPAT flag from reaching a user-mode task, which
  might have allowed local users to bypass the seccomp or audit protection
  mechanism via a crafted application that uses the (1) fork or (2) close
  system call, as demonstrated by an attack against seccomp before 3.16
  (bnc#926240).
- CVE-2015-1805: The Linux kernels implementation of vectored pipe
  read and write functionality did not take into account the I/O vectors
  that were already processed when retrying after a failed atomic access
  operation, potentially resulting in memory corruption due to an I/O vector
  array overrun. A local, unprivileged user could use this flaw to crash
  the system or, potentially, escalate their privileges on the system.
  (bsc#933429).


Also the following non-security bugs were fixed:
- audit: keep inode pinned (bsc#851068).
- btrfs: be aware of btree inode write errors to avoid fs corruption (bnc#942350).
- btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- cifs: Fix missing crypto allocation (bnc#937402).
- client MUST ignore EncryptionKeyLength if CAP_EXTENDED_SECURITY is set (bnc#932348).
- drm: ast,cirrus,mgag200: use drm_can_sleep (bnc#883380, bsc#935572).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails.
- ext3: Fix data corruption in inodes with journalled data (bsc#936637)
- ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle integer overflow in dma_ops_area_alloc (bsc#931538).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipr: Increase default adapter init stage change timeout (bsc#930761).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn. (bsc#934742)
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- nfsd: Fix nfsv4 opcode decoding error (bsc#935906).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- nfs: never queue requests with rq_cong set on the sending queue (bsc#932458).
- nfsv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Disable Bus Master only on kexec reboot (bsc#920110).
- pci: disable Bus Master on PCI device shutdown (bsc#920110).
- pci: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- pci: Don't try to disable Bus Master on disconnected PCI devices (bsc#920110).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler  (bsc#929142).
- rtlwifi: rtl8192cu: Fix kernel deadlock (bnc#927786).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: set host msg status correctly (bnc#933936)
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: avoid mounting of xfs filesystems with inconsistent option (bnc#925705)
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936925, LTC#126491).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/851068">SUSE bug 851068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927786">SUSE bug 927786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930761">SUSE bug 930761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931538">SUSE bug 931538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932348">SUSE bug 932348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932458">SUSE bug 932458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933936">SUSE bug 933936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934742">SUSE bug 934742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934944">SUSE bug 934944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566727" comment="kernel-bigsmp-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566728" comment="kernel-default-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566729" comment="kernel-default-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566730" comment="kernel-default-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566731" comment="kernel-default-extra-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566732" comment="kernel-pae-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566733" comment="kernel-pae-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566734" comment="kernel-pae-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566735" comment="kernel-pae-extra-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566736" comment="kernel-source-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566737" comment="kernel-syms-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566738" comment="kernel-trace-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566739" comment="kernel-xen-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566740" comment="kernel-xen-base-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566741" comment="kernel-xen-devel-3.0.101-0.47.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566742" comment="kernel-xen-extra-3.0.101-0.47.67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78365" version="1" class="patch">
	<metadata>
		<title>Security update for Linux kernel</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="774818" ref_url="https://bugzilla.suse.com/774818" source="BUGZILLA"/>
		<reference ref_id="806990" ref_url="https://bugzilla.suse.com/806990" source="BUGZILLA"/>
		<reference ref_id="816708" ref_url="https://bugzilla.suse.com/816708" source="BUGZILLA"/>
		<reference ref_id="826486" ref_url="https://bugzilla.suse.com/826486" source="BUGZILLA"/>
		<reference ref_id="832309" ref_url="https://bugzilla.suse.com/832309" source="BUGZILLA"/>
		<reference ref_id="849123" ref_url="https://bugzilla.suse.com/849123" source="BUGZILLA"/>
		<reference ref_id="855657" ref_url="https://bugzilla.suse.com/855657" source="BUGZILLA"/>
		<reference ref_id="859840" ref_url="https://bugzilla.suse.com/859840" source="BUGZILLA"/>
		<reference ref_id="860441" ref_url="https://bugzilla.suse.com/860441" source="BUGZILLA"/>
		<reference ref_id="860593" ref_url="https://bugzilla.suse.com/860593" source="BUGZILLA"/>
		<reference ref_id="863586" ref_url="https://bugzilla.suse.com/863586" source="BUGZILLA"/>
		<reference ref_id="866130" ref_url="https://bugzilla.suse.com/866130" source="BUGZILLA"/>
		<reference ref_id="866615" ref_url="https://bugzilla.suse.com/866615" source="BUGZILLA"/>
		<reference ref_id="866864" ref_url="https://bugzilla.suse.com/866864" source="BUGZILLA"/>
		<reference ref_id="866911" ref_url="https://bugzilla.suse.com/866911" source="BUGZILLA"/>
		<reference ref_id="869055" ref_url="https://bugzilla.suse.com/869055" source="BUGZILLA"/>
		<reference ref_id="869934" ref_url="https://bugzilla.suse.com/869934" source="BUGZILLA"/>
		<reference ref_id="870161" ref_url="https://bugzilla.suse.com/870161" source="BUGZILLA"/>
		<reference ref_id="871797" ref_url="https://bugzilla.suse.com/871797" source="BUGZILLA"/>
		<reference ref_id="876017" ref_url="https://bugzilla.suse.com/876017" source="BUGZILLA"/>
		<reference ref_id="876055" ref_url="https://bugzilla.suse.com/876055" source="BUGZILLA"/>
		<reference ref_id="876114" ref_url="https://bugzilla.suse.com/876114" source="BUGZILLA"/>
		<reference ref_id="876590" ref_url="https://bugzilla.suse.com/876590" source="BUGZILLA"/>
		<reference ref_id="879921" ref_url="https://bugzilla.suse.com/879921" source="BUGZILLA"/>
		<reference ref_id="880344" ref_url="https://bugzilla.suse.com/880344" source="BUGZILLA"/>
		<reference ref_id="880370" ref_url="https://bugzilla.suse.com/880370" source="BUGZILLA"/>
		<reference ref_id="881051" ref_url="https://bugzilla.suse.com/881051" source="BUGZILLA"/>
		<reference ref_id="881759" ref_url="https://bugzilla.suse.com/881759" source="BUGZILLA"/>
		<reference ref_id="882317" ref_url="https://bugzilla.suse.com/882317" source="BUGZILLA"/>
		<reference ref_id="882639" ref_url="https://bugzilla.suse.com/882639" source="BUGZILLA"/>
		<reference ref_id="882804" ref_url="https://bugzilla.suse.com/882804" source="BUGZILLA"/>
		<reference ref_id="882900" ref_url="https://bugzilla.suse.com/882900" source="BUGZILLA"/>
		<reference ref_id="883376" ref_url="https://bugzilla.suse.com/883376" source="BUGZILLA"/>
		<reference ref_id="883518" ref_url="https://bugzilla.suse.com/883518" source="BUGZILLA"/>
		<reference ref_id="883724" ref_url="https://bugzilla.suse.com/883724" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="884582" ref_url="https://bugzilla.suse.com/884582" source="BUGZILLA"/>
		<reference ref_id="884725" ref_url="https://bugzilla.suse.com/884725" source="BUGZILLA"/>
		<reference ref_id="884767" ref_url="https://bugzilla.suse.com/884767" source="BUGZILLA"/>
		<reference ref_id="885262" ref_url="https://bugzilla.suse.com/885262" source="BUGZILLA"/>
		<reference ref_id="885382" ref_url="https://bugzilla.suse.com/885382" source="BUGZILLA"/>
		<reference ref_id="885422" ref_url="https://bugzilla.suse.com/885422" source="BUGZILLA"/>
		<reference ref_id="885509" ref_url="https://bugzilla.suse.com/885509" source="BUGZILLA"/>
		<reference ref_id="886840" ref_url="https://bugzilla.suse.com/886840" source="BUGZILLA"/>
		<reference ref_id="887082" ref_url="https://bugzilla.suse.com/887082" source="BUGZILLA"/>
		<reference ref_id="887503" ref_url="https://bugzilla.suse.com/887503" source="BUGZILLA"/>
		<reference ref_id="887608" ref_url="https://bugzilla.suse.com/887608" source="BUGZILLA"/>
		<reference ref_id="887645" ref_url="https://bugzilla.suse.com/887645" source="BUGZILLA"/>
		<reference ref_id="887680" ref_url="https://bugzilla.suse.com/887680" source="BUGZILLA"/>
		<reference ref_id="888058" ref_url="https://bugzilla.suse.com/888058" source="BUGZILLA"/>
		<reference ref_id="888105" ref_url="https://bugzilla.suse.com/888105" source="BUGZILLA"/>
		<reference ref_id="888591" ref_url="https://bugzilla.suse.com/888591" source="BUGZILLA"/>
		<reference ref_id="888607" ref_url="https://bugzilla.suse.com/888607" source="BUGZILLA"/>
		<reference ref_id="888847" ref_url="https://bugzilla.suse.com/888847" source="BUGZILLA"/>
		<reference ref_id="888849" ref_url="https://bugzilla.suse.com/888849" source="BUGZILLA"/>
		<reference ref_id="888968" ref_url="https://bugzilla.suse.com/888968" source="BUGZILLA"/>
		<reference ref_id="889061" ref_url="https://bugzilla.suse.com/889061" source="BUGZILLA"/>
		<reference ref_id="889173" ref_url="https://bugzilla.suse.com/889173" source="BUGZILLA"/>
		<reference ref_id="889451" ref_url="https://bugzilla.suse.com/889451" source="BUGZILLA"/>
		<reference ref_id="889614" ref_url="https://bugzilla.suse.com/889614" source="BUGZILLA"/>
		<reference ref_id="889727" ref_url="https://bugzilla.suse.com/889727" source="BUGZILLA"/>
		<reference ref_id="890297" ref_url="https://bugzilla.suse.com/890297" source="BUGZILLA"/>
		<reference ref_id="890426" ref_url="https://bugzilla.suse.com/890426" source="BUGZILLA"/>
		<reference ref_id="890513" ref_url="https://bugzilla.suse.com/890513" source="BUGZILLA"/>
		<reference ref_id="890526" ref_url="https://bugzilla.suse.com/890526" source="BUGZILLA"/>
		<reference ref_id="891087" ref_url="https://bugzilla.suse.com/891087" source="BUGZILLA"/>
		<reference ref_id="891259" ref_url="https://bugzilla.suse.com/891259" source="BUGZILLA"/>
		<reference ref_id="891619" ref_url="https://bugzilla.suse.com/891619" source="BUGZILLA"/>
		<reference ref_id="892200" ref_url="https://bugzilla.suse.com/892200" source="BUGZILLA"/>
		<reference ref_id="892490" ref_url="https://bugzilla.suse.com/892490" source="BUGZILLA"/>
		<reference ref_id="892723" ref_url="https://bugzilla.suse.com/892723" source="BUGZILLA"/>
		<reference ref_id="893064" ref_url="https://bugzilla.suse.com/893064" source="BUGZILLA"/>
		<reference ref_id="893496" ref_url="https://bugzilla.suse.com/893496" source="BUGZILLA"/>
		<reference ref_id="893596" ref_url="https://bugzilla.suse.com/893596" source="BUGZILLA"/>
		<reference ref_id="894200" ref_url="https://bugzilla.suse.com/894200" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979/" source="CVE"/>
		<reference ref_id="CVE-2014-1739" ref_url="https://www.suse.com/security/cve/CVE-2014-1739/" source="CVE"/>
		<reference ref_id="CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706/" source="CVE"/>
		<reference ref_id="CVE-2014-4027" ref_url="https://www.suse.com/security/cve/CVE-2014-4027/" source="CVE"/>
		<reference ref_id="CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171/" source="CVE"/>
		<reference ref_id="CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508/" source="CVE"/>
		<reference ref_id="CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667/" source="CVE"/>
		<reference ref_id="CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943/" source="CVE"/>
		<reference ref_id="CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077/" source="CVE"/>
		<reference ref_id="CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471/" source="CVE"/>
		<reference ref_id="CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 kernel has been updated to fix 
various bugs and security issues.

The following security bugs have been fixed:

    * 

      CVE-2014-1739: The media_device_enum_entities function in
      drivers/media/media-device.c in the Linux kernel before 3.14.6 does
      not initialize a certain data structure, which allows local users to
      obtain sensitive information from kernel memory by leveraging
      /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call
      (bnc#882804).

    * 

      CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not
      properly implement the interaction between range notification and
      hole punching, which allows local users to cause a denial of service
      (i_mutex hold) by using the mmap system call to access a hole, as
      demonstrated by interfering with intended shmem activity by blocking
      completion of (1) an MADV_REMOVE madvise call or (2) an
      FALLOC_FL_PUNCH_HOLE fallocate call (bnc#883518).

    * 

      CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through
      3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and
      the sep CPU feature flag is set, allows local users to cause a denial
      of service (OOPS and system crash) via an invalid syscall number, as
      demonstrated by number 1000 (bnc#883724).

    * 

      CVE-2014-4667: The sctp_association_free function in
      net/sctp/associola.c in the Linux kernel before 3.15.2 does not
      properly manage a certain backlog value, which allows remote
      attackers to cause a denial of service (socket outage) via a crafted
      SCTP packet (bnc#885422).

    * 

      CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the
      Linux kernel through 3.15.6 allows local users to gain privileges by
      leveraging data-structure differences between an l2tp socket and an
      inet socket (bnc#887082).

    * 

      CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c
      in the Linux kernel through 3.15.8, when SCTP authentication is
      enabled, allows remote attackers to cause a denial of service (NULL
      pointer dereference and OOPS) by starting to establish an association
      between two endpoints immediately after an exchange of INIT and INIT
      ACK chunks to establish an earlier association between these
      endpoints in the opposite direction (bnc#889173).

    * 

      CVE-2014-5471: Stack consumption vulnerability in the
      parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the
      Linux kernel through 3.16.1 allows local users to cause a denial of
      service (uncontrolled recursion, and system crash or reboot) via a
      crafted iso9660 image with a CL entry referring to a directory entry
      that has a CL entry. (bnc#892490)

    * 

      CVE-2014-5472: The parse_rock_ridge_inode_internal function in
      fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users
      to cause a denial of service (unkillable mount process) via a crafted
      iso9660 image with a self-referential CL entry. (bnc#892490)

    * 

      CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux
      kernel before 3.13.7 allows remote attackers to cause a denial of
      service (system crash) via network traffic that improperly interacts
      with the WLAN_STA_PS_STA state (aka power-save mode), related to
      sta_info.c and tx.c. (bnc#871797)

    * 

      CVE-2014-4027: The rd_build_device_space function in
      drivers/target/target_core_rd.c in the Linux kernel before 3.14 does
      not properly initialize a certain data structure, which allows local
      users to obtain sensitive information from ramdisk_mcp memory by
      leveraging access to a SCSI initiator. (bnc#882639)

    * 

      CVE-2014-3153 The futex_requeue function in kernel/futex.c in the
      Linux kernel through 3.14.5 does not ensure that calls have two
      different futex addresses, which allows local users to gain
      privileges via a crafted FUTEX_REQUEUE command that facilitates
      unsafe waiter modification. (bnc#880892)

    * 

      CVE-2014-6410: Avoid infinite loop when processing indirect ICBs
      (bnc#896689)

The following non-security bugs have been fixed:

    * ACPI / PAD: call schedule() when need_resched() is true (bnc#866911).
    * ACPI: Fix bug when ACPI reset register is implemented in system
      memory (bnc#882900).
    * ACPI: Limit access to custom_method (bnc#884333).
    * ALSA: hda - Enabling Realtek ALC 671 codec (bnc#891746).
    * Add option to automatically enforce module signatures when in Secure
      Boot mode (bnc#884333).
    * Add secure_modules() call (bnc#884333).
    * Add wait_on_atomic_t() and wake_up_atomic_t() (bnc#880344).
    * Backported new patches of Lock down functions for UEFI secure boot
      Also updated series.conf and removed old patches.
    * Btrfs: Return EXDEV for cross file system snapshot.
    * Btrfs: abort the transaction when we does not find our extent ref.
    * Btrfs: avoid warning bomb of btrfs_invalidate_inodes.
    * Btrfs: cancel scrub on transaction abortion.
    * Btrfs: correctly set profile flags on seqlock retry.
    * Btrfs: does not check nodes for extent items.
    * Btrfs: fix a possible deadlock between scrub and transaction
      committing.
    * Btrfs: fix corruption after write/fsync failure + fsync + log
      recovery (bnc#894200).
    * Btrfs: fix csum tree corruption, duplicate and outdated checksums
      (bnc#891619).
    * Btrfs: fix double free in find_lock_delalloc_range.
    * Btrfs: fix possible memory leak in btrfs_create_tree().
    * Btrfs: fix use of uninit 'ret' in end_extent_writepage().
    * Btrfs: free delayed node outside of root-&gt;inode_lock (bnc#866864).
    * Btrfs: make DEV_INFO ioctl available to anyone.
    * Btrfs: make FS_INFO ioctl available to anyone.
    * Btrfs: make device scan less noisy.
    * Btrfs: make sure there are not any read requests before stopping
      workers.
    * Btrfs: more efficient io tree navigation on wait_extent_bit.
    * Btrfs: output warning instead of error when loading free space cache
      failed.
    * Btrfs: retrieve more info from FS_INFO ioctl.
    * Btrfs: return EPERM when deleting a default subvolume (bnc#869934).
    * Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol
      (bnc#866615).
    * Btrfs: use right type to get real comparison.
    * Btrfs: wake up @scrub_pause_wait as much as we can.
    * Btrfs: wake up transaction thread upon remount.
    * CacheFiles: Add missing retrieval completions (bnc#880344).
    * CacheFiles: Does not try to dump the index key if the cookie has been
      cleared (bnc#880344).
    * CacheFiles: Downgrade the requirements passed to the allocator
      (bnc#880344).
    * CacheFiles: Fix the marking of cached pages (bnc#880344).
    * CacheFiles: Implement invalidation (bnc#880344).
    * CacheFiles: Make some debugging statements conditional (bnc#880344).
    * Drivers: hv: util: Fix a bug in the KVP code (bnc#886840).
    * Drivers: hv: vmbus: Fix a bug in the channel callback dispatch code
      (bnc#886840).
    * FS-Cache: Add transition to handle invalidate immediately after
      lookup (bnc#880344).
    * FS-Cache: Check that there are no read ops when cookie relinquished
      (bnc#880344).
    * FS-Cache: Clear remaining page count on retrieval cancellation
      (bnc#880344).
    * FS-Cache: Convert the object event ID #defines into an enum
      (bnc#880344).
    * FS-Cache: Does not sleep in page release if __GFP_FS is not set
      (bnc#880344).
    * FS-Cache: Does not use spin_is_locked() in assertions (bnc#880344).
    * FS-Cache: Exclusive op submission can BUG if there is been an I/O
      error (bnc#880344).
    * FS-Cache: Fix __wait_on_atomic_t() to call the action func if the
      counter != 0 (bnc#880344).
    * FS-Cache: Fix object state machine to have separate work and wait
      states (bnc#880344).
    * FS-Cache: Fix operation state management and accounting (bnc#880344).
    * FS-Cache: Fix signal handling during waits (bnc#880344).
    * FS-Cache: Initialise the object event mask with the calculated mask
      (bnc#880344).
    * FS-Cache: Limit the number of I/O error reports for a cache
      (bnc#880344).
    * FS-Cache: Make cookie relinquishment wait for outstanding reads
      (bnc#880344).
    * FS-Cache: Mark cancellation of in-progress operation (bnc#880344).
    * FS-Cache: One of the write operation paths doeses not set the object
      state (bnc#880344).
    * FS-Cache: Provide proper invalidation (bnc#880344).
    * FS-Cache: Simplify cookie retention for fscache_objects, fixing oops
      (bnc#880344).
    * FS-Cache: The retrieval remaining-pages counter needs to be atomic_t
      (bnc#880344).
    * FS-Cache: Uninline fscache_object_init() (bnc#880344).
    * FS-Cache: Wrap checks on object state (bnc#880344).
    * HID: usbhid: add always-poll quirk (bnc#888607).
    * HID: usbhid: enable always-poll quirk for Elan Touchscreen
      (bnc#888607).
    * IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297).
    * Ignore 'flags' change to event_constraint (bnc#876114).
    * Ignore data_src/weight changes to perf_sample_data (bnc#876114).
    * NFS: Allow more operations in an NFSv4.1 request (bnc#890513).
    * NFS: Clean up helper function nfs4_select_rw_stateid() (bnc#888968).
    * NFS: Does not copy read delegation stateids in setattr (bnc#888968).
    * NFS: Does not use a delegation to open a file when returning that
      delegation (bnc#888968, bnc#892200, bnc#893596, bnc#893496)
    * NFS: Fixes for NFS RCU-walk support in line with code going upstream
    * NFS: Use FS-Cache invalidation (bnc#880344).
    * NFS: allow lockless access to access_cache (bnc#866130).
    * NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts
      (bnc#888591).
    * NFS: nfs4_do_open should add negative results to the dcache
      (bnc#866130).
    * NFS: nfs_migrate_page() does not wait for FS-Cache to finish with a
      page (bnc#880344).
    * NFS: nfs_open_revalidate: only evaluate parent if it will be used
      (bnc#866130).
    * NFS: prepare for RCU-walk support but pushing tests later in code
      (bnc#866130).
    * NFS: support RCU_WALK in nfs_permission() (bnc#866130).
    * NFS: teach nfs_lookup_verify_inode to handle LOOKUP_RCU (bnc#866130).
    * NFS: teach nfs_neg_need_reval to understand LOOKUP_RCU (bnc#866130).
    * NFSD: Does not hand out delegations for 30 seconds after recalling
      them (bnc#880370).
    * NFSv4 set open access operation call flag in nfs4_init_opendata_res
      (bnc#888968, bnc#892200, bnc#893596, bnc#893496).
    * NFSv4: Add a helper for encoding opaque data (bnc#888968).
    * NFSv4: Add a helper for encoding stateids (bnc#888968).
    * NFSv4: Add helpers for basic copying of stateids (bnc#888968).
    * NFSv4: Clean up nfs4_select_rw_stateid() (bnc#888968).
    * NFSv4: Fix the return value of nfs4_select_rw_stateid (bnc#888968).
    * NFSv4: Rename nfs4_copy_stateid() (bnc#888968).
    * NFSv4: Resend the READ/WRITE RPC call if a stateid change causes an
      error (bnc#888968).
    * NFSv4: Simplify the struct nfs4_stateid (bnc#888968).
    * NFSv4: The stateid must remain the same for replayed RPC calls
      (bnc#888968).
    * NFSv4: nfs4_stateid_is_current should return 'true' for an invalid
      stateid (bnc#888968).
    * One more fix for kABI breakage.
    * PCI: Lock down BAR access when module security is enabled
      (bnc#884333).
    * PCI: enable MPS 'performance' setting to properly handle bridge MPS
      (bnc#883376).
    * PM / Hibernate: Add memory_rtree_find_bit function (bnc#860441).
    * PM / Hibernate: Create a Radix-Tree to store memory bitmap
      (bnc#860441).
    * PM / Hibernate: Implement position keeping in radix tree
      (bnc#860441).
    * PM / Hibernate: Iterate over set bits instead of PFNs in
      swsusp_free() (bnc#860441).
    * PM / Hibernate: Remove the old memory-bitmap implementation
      (bnc#860441).
    * PM / Hibernate: Touch Soft Lockup Watchdog in rtree_next_node
      (bnc#860441).
    * Restrict /dev/mem and /dev/kmem when module loading is restricted
      (bnc#884333).
    * Reuse existing 'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT
      (bnc#876114).
    * USB: handle LPM errors during device suspend correctly (bnc#849123).
    * Update kabi files to reflect fscache change (bnc#880344)
    * Update x86_64 config files: re-enable SENSORS_W83627EHF (bnc#891281)
    * VFS: Make more complete truncate operation available to CacheFiles
      (bnc#880344).
    * [FEAT NET1222] ib_uverbs: Allow explicit mmio trigger (FATE#83366,
      ltc#83367).
    * acpi: Ignore acpi_rsdp kernel parameter when module loading is
      restricted (bnc#884333).
    * af_iucv: correct cleanup if listen backlog is full (bnc#885262,
      LTC#111728).
    * asus-wmi: Restrict debugfs interface when module loading is
      restricted (bnc#884333).
    * autofs4: allow RCU-walk to walk through autofs4 (bnc#866130).
    * autofs4: avoid taking fs_lock during rcu-walk (bnc#866130).
    * autofs4: does not take spinlock when not needed in
      autofs4_lookup_expiring (bnc#866130).
    * autofs4: factor should_expire() out of autofs4_expire_indirect
      (bnc#866130).
    * autofs4: make 'autofs4_can_expire' idempotent (bnc#866130).
    * autofs4: remove a redundant assignment (bnc#866130).
    * autofs: fix lockref lookup (bnc#888591).
    * be2net: add dma_mapping_error() check for dma_map_page()
      (bnc#881759).
    * block: add cond_resched() to potentially long running ioctl discard
      loop (bnc#884725).
    * block: fix race between request completion and timeout handling
      (bnc#881051).
    * cdc-ether: clean packet filter upon probe (bnc#876017).
    * cpuset: Fix memory allocator deadlock (bnc#876590).
    * crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs
      have them, but some are FIPS certified, with some kernel support.
    * crypto: fips - only panic on bad/missing crypto mod signatures
      (bnc#887503).
    * crypto: testmgr - allow aesni-intel and ghash_clmulni-intel in fips
      mode (bnc#889451).
    * dasd: validate request size before building CCW/TCW (bnc#891087,
      LTC#114068).
    * dm mpath: fix race condition between multipath_dtr and pg_init_done
      (bnc#826486).
    * dm-mpath: fix panic on deleting sg device (bnc#870161).
    * drm/ast: AST2000 cannot be detected correctly (bnc#895983).
    * drm/ast: Actually load DP501 firmware when required (bnc#895608
      bnc#871134).
    * drm/ast: Add missing entry to dclk_table[].
    * drm/ast: Add reduced non reduced mode parsing for wide screen mode
      (bnc#892723).
    * drm/ast: initial DP501 support (v0.2) (bnc#871134).
    * drm/ast: open key before detect chips (bnc#895983).
    * drm/i915: Fix up cpt pixel multiplier enable sequence (bnc#879304).
    * drm/i915: Only apply DPMS to the encoder if enabled (bnc#893064).
    * drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at driver init
      (bnc#869055).
    * drm/i915: create functions for the 'unclaimed register' checks
      (bnc#869055).
    * drm/i915: use FPGA_DBG for the 'unclaimed register' checks
      (bnc#869055).
    * drm/mgag200: Initialize data needed to map fbdev memory (bnc
      #806990).
    * e1000e: enable support for new device IDs (bnc#885509).
    * fs/fscache: remove spin_lock() from the condition in while()
      (bnc#880344).
    * hibernate: Disable in a signed modules environment (bnc#884333).
    * hugetlb: does not use ERR_PTR with VM_FAULT* values
    * ibmvscsi: Abort init sequence during error recovery (bnc#885382).
    * ibmvscsi: Add memory barriers for send / receive (bnc#885382).
    * inet: add a redirect generation id in inetpeer (bnc#860593).
    * inetpeer: initialize -&gt;redirect_genid in inet_getpeer() (bnc#860593).
    * ipv6: tcp: fix tcp_v6_conn_request() (bnc#887645).
    * kabi: hide bnc#860593 changes of struct inetpeer_addr_base
      (bnc#860593).
    * kernel: 3215 tty hang (bnc#891087, LTC#114562).
    * kernel: fix data corruption when reading /proc/sysinfo (bnc#891087,
      LTC#114480).
    * kernel: fix kernel oops with load of fpc register (bnc#889061,
      LTC#113596).
    * kernel: sclp console tty reference counting (bnc#891087, LTC#115466).
    * kexec: Disable at runtime if the kernel enforces module loading
      restrictions (bnc#884333).
    * md/raid6: avoid data corruption during recovery of double-degraded
      RAID6.
    * memcg, vmscan: Fix forced scan of anonymous pages (memory reclaim
      fix).
    * memcg: do not expose uninitialized mem_cgroup_per_node to world
      (bnc#883096).
    * mm, hugetlb: add VM_NORESERVE check in vma_has_reserves()
    * mm, hugetlb: change variable name reservations to resv
    * mm, hugetlb: decrement reserve count if VM_NORESERVE alloc page cache
    * mm, hugetlb: defer freeing pages when gathering surplus pages
    * mm, hugetlb: do not use a page in page cache for cow optimization
    * mm, hugetlb: fix and clean-up node iteration code to alloc or free
    * mm, hugetlb: fix race in region tracking
    * mm, hugetlb: fix subpool accounting handling
    * mm, hugetlb: improve page-fault scalability
    * mm, hugetlb: improve, cleanup resv_map parameters
    * mm, hugetlb: move up the code which check availability of free huge
      page
    * mm, hugetlb: protect reserved pages when soft offlining a hugepage
    * mm, hugetlb: remove decrement_hugepage_resv_vma()
    * mm, hugetlb: remove redundant list_empty check in
      gather_surplus_pages()
    * mm, hugetlb: remove resv_map_put
    * mm, hugetlb: remove useless check about mapping type
    * mm, hugetlb: return a reserved page to a reserved pool if failed
    * mm, hugetlb: trivial commenting fix
    * mm, hugetlb: unify region structure handling
    * mm, hugetlb: unify region structure handling kabi
    * mm, hugetlb: use long vars instead of int in region_count() (Hugetlb
      Fault Scalability).
    * mm, hugetlb: use vma_resv_map() map types
    * mm, oom: fix badness score underflow (bnc#884582, bnc#884767).
    * mm, oom: normalize oom scores to oom_score_adj scale only for
      userspace (bnc#884582, bnc#884767).
    * mm, thp: do not allow thp faults to avoid cpuset restrictions
      (bnc#888849).
    * net/mlx4_core: Load higher level modules according to ports type
      (bnc#887680).
    * net/mlx4_core: Load the IB driver when the device supports IBoE
      (bnc#887680).
    * net/mlx4_en: Fix a race between napi poll function and RX ring
      cleanup (bnc#863586).
    * net/mlx4_en: Fix selftest failing on non 10G link speed (bnc#888058).
    * net: fix checksumming features handling in output path (bnc#891259).
    * pagecache_limit: batch large nr_to_scan targets (bnc#895221).
    * pagecachelimit: reduce lru_lock congestion for heavy parallel reclaim
      fix (bnc#895680).
    * perf/core: Add weighted samples (bnc#876114).
    * perf/x86: Add flags to event constraints (bnc#876114).
    * perf/x86: Add memory profiling via PEBS Load Latency (bnc#876114).
    * perf: Add generic memory sampling interface (bnc#876114).
    * qla2xxx: Avoid escalating the SCSI error handler if the command is
      not found in firmware (bnc#859840).
    * qla2xxx: Clear loop_id for ports that are marked lost during fabric
      scanning (bnc#859840).
    * qla2xxx: Does not check for firmware hung during the reset context
      for ISP82XX (bnc#859840).
    * qla2xxx: Issue abort command for outstanding commands during cleanup
      when only firmware is alive (bnc#859840).
    * qla2xxx: Reduce the time we wait for a command to complete during
      SCSI error handling (bnc#859840).
    * qla2xxx: Set host can_queue value based on available resources
      (bnc#859840).
    * restore smp_mb() in unlock_new_inode() (bnc#890526).
    * s390/pci: introduce lazy IOTLB flushing for DMA unmap (bnc#889061,
      LTC#113725).
    * sched: fix the theoretical signal_wake_up() vs schedule() race
      (bnc#876055).
    * sclp_vt220: Enable integrated ASCII console per default (bnc#885262,
      LTC#112035).
    * scsi_dh: use missing accessor 'scsi_device_from_queue' (bnc#889614).
    * scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608).
    * scsiback: correct grant page unmapping.
    * scsiback: fix retry handling in __report_luns().
    * scsiback: free resources after error.
    * sunrpc/auth: allow lockless (rcu) lookup of credential cache
      (bnc#866130).
    * supported.conf: remove external from drivers/net/veth (bnc#889727)
    * supported.conf: support net/sched/act_police.ko (bnc#890426)
    * tcp: adapt selected parts of RFC 5682 and PRR logic (bnc#879921).
    * tg3: Change nvram command timeout value to 50ms (bnc#855657).
    * tg3: Override clock, link aware and link idle mode during NVRAM dump
      (bnc#855657).
    * tg3: Set the MAC clock to the fastest speed during boot code load
      (bnc#855657).
    * usb: Does not enable LPM if the exit latency is zero (bnc#832309).
    * usbcore: Does not log on consecutive debounce failures of the same
      port (bnc#888105).
    * usbhid: fix PIXART optical mouse (bnc#888607).
    * uswsusp: Disable when module loading is restricted (bnc#884333).
    * vscsi: support larger transfer sizes (bnc#774818).
    * writeback: Do not sync data dirtied after sync start (bnc#833820).
    * x86 thermal: Delete power-limit-notification console messages
      (bnc#882317).
    * x86 thermal: Disable power limit notification interrupt by default
      (bnc#882317).
    * x86 thermal: Re-enable power limit notification interrupt by default
      (bnc#882317).
    * x86, cpu hotplug: Fix stack frame warning in
      check_irq_vectors_for_cpu_disable() (bnc#887418).
    * x86/UV: Add call to KGDB/KDB from NMI handler (bnc#888847).
    * x86/UV: Add kdump to UV NMI handler (bnc#888847).
    * x86/UV: Add summary of cpu activity to UV NMI handler (bnc#888847).
    * x86/UV: Move NMI support (bnc#888847).
    * x86/UV: Update UV support for external NMI signals (bnc#888847).
    * x86/uv/nmi: Fix Sparse warnings (bnc#888847).
    * x86: Add check for number of available vectors before CPU down
      (bnc#887418).
    * x86: Lock down IO port access when module security is enabled
      (bnc#884333).
    * x86: Restrict MSR access when module loading is restricted
      (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;
    * CVE-2014-3153
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153&gt;
    * CVE-2014-6410
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410&gt;

The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix 
various bugs and security issues.

Following security bugs were fixed: CVE-2013-1979: The scm_set_cred 
function in include/net/scm.h in the Linux kernel before 3.8.11 uses 
incorrect uid and gid values during credentials passing, which allows local 
users to gain privileges via a crafted application (bnc#816708).

CVE-2014-1739: The media_device_enum_entities function in 
drivers/media/media-device.c in the Linux kernel before 3.14.6 does not 
initialize a certain data structure, which allows local users to obtain 
sensitive information from kernel memory by leveraging /dev/media0 read 
access for a MEDIA_IOC_ENUM_ENTITIES ioctl call (bnc#882804).

CVE-2014-4171: mm/shmem.c in the Linux kernel through 3.15.1 does not 
properly implement the interaction between range notification and hole 
punching, which allows local users to cause a denial of service (i_mutex 
hold) by using the mmap system call to access a hole, as demonstrated by 
interfering with intended shmem activity by blocking completion of (1) an 
MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call 
(bnc#883518).

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel through 
3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the 
sep CPU feature flag is set, allows local users to cause a denial of 
service (OOPS and system crash) via an invalid syscall number, as 
demonstrated by number 1000 (bnc#883724).

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c 
in the Linux kernel before 3.15.2 does not properly manage a certain 
backlog value, which allows remote attackers to cause a denial of service 
(socket outage) via a crafted SCTP packet (bnc#885422).

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux 
kernel through 3.15.6 allows local users to gain privileges by leveraging 
data-structure differences between an l2tp socket and an inet socket 
(bnc#887082).

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in 
the Linux kernel through 3.15.8, when SCTP authentication is enabled, 
allows remote attackers to cause a denial of service (NULL pointer 
dereference and OOPS) by starting to establish an association between two 
endpoints immediately after an exchange of INIT and INIT ACK chunks to 
establish an earlier association between these endpoints in the opposite 
direction (bnc#889173).

CVE-2014-5471: Stack consumption vulnerability in the 
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux 
kernel through 3.16.1 allows local users to cause a denial of service 
(uncontrolled recursion, and system crash or reboot) via a crafted iso9660 
image with a CL entry referring to a directory entry that has a CL entry. 
(bnc#892490)

CVE-2014-5472: The parse_rock_ridge_inode_internal function in 
fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to 
cause a denial of service (unkillable mount process) via a crafted iso9660 
image with a self-referential CL entry. (bnc#892490)

CVE-2014-2706: Race condition in the mac80211 subsystem in the Linux kernel 
before 3.13.7 allows remote attackers to cause a denial of service (system 
crash) via network traffic that improperly interacts with the 
WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and 
tx.c. (bnc#871797)

CVE-2014-4027: The rd_build_device_space function in 
drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not 
properly initialize a certain data structure, which allows local users to 
obtain sensitive information from ramdisk_mcp memory by leveraging access 
to a SCSI initiator. (bnc#882639)

The following non-security bugs were fixed: - ACPI / PAD: call schedule() 
when need_resched() is true (bnc#866911). - ACPI: Fix bug when ACPI reset 
register is implemented in system memory (bnc#882900). - ACPI: Limit access 
to custom_method (bnc#884333). - Add option to automatically enforce module 
signatures when in Secure Boot mode (bnc#884333). - Add secure_modules() 
call (bnc#884333). - Add wait_on_atomic_t() and wake_up_atomic_t() 
(bnc#880344). - Backported new patches of Lock down functions for UEFI 
secure boot Also updated series.conf and removed old patches. - Btrfs: 
Return EXDEV for cross file system snapshot. - Btrfs: abort the transaction 
when we does not find our extent ref. - Btrfs: avoid warning bomb of 
btrfs_invalidate_inodes. - Btrfs: cancel scrub on transaction abortion. - 
Btrfs: correctly set profile flags on seqlock retry. - Btrfs: does not 
check nodes for extent items. - Btrfs: fix a possible deadlock between 
scrub and transaction committing. - Btrfs: fix corruption after write/fsync 
failure + fsync + log recovery (bnc#894200). - Btrfs: fix csum tree 
corruption, duplicate and outdated checksums (bnc#891619). - Btrfs: fix 
double free in find_lock_delalloc_range. - Btrfs: fix possible memory leak 
in btrfs_create_tree(). - Btrfs: fix use of uninit 'ret' in 
end_extent_writepage(). - Btrfs: free delayed node outside of 
root-&gt;inode_lock (bnc#866864). - Btrfs: make DEV_INFO ioctl available to 
anyone. - Btrfs: make FS_INFO ioctl available to anyone. - Btrfs: make 
device scan less noisy. - Btrfs: make sure there are not any read requests 
before stopping workers. - Btrfs: more efficient io tree navigation on 
wait_extent_bit. - Btrfs: output warning instead of error when loading free 
space cache failed. - Btrfs: retrieve more info from FS_INFO ioctl. - 
Btrfs: return EPERM when deleting a default subvolume (bnc#869934). - 
Btrfs: unset DCACHE_DISCONNECTED when mounting default subvol (bnc#866615). 
- Btrfs: use right type to get real comparison. - Btrfs: wake up 
@scrub_pause_wait as much as we can. - Btrfs: wake up transaction thread 
upon remount. - CacheFiles: Add missing retrieval completions (bnc#880344). 
- CacheFiles: Does not try to dump the index key if the cookie has been 
cleared (bnc#880344). - CacheFiles: Downgrade the requirements passed to 
the allocator (bnc#880344). - CacheFiles: Fix the marking of cached pages 
(bnc#880344). - CacheFiles: Implement invalidation (bnc#880344). - 
CacheFiles: Make some debugging statements conditional (bnc#880344). - 
Drivers: hv: util: Fix a bug in the KVP code (bnc#886840). - Drivers: hv: 
vmbus: Fix a bug in the channel callback dispatch code (bnc#886840). - 
FS-Cache: Add transition to handle invalidate immediately after lookup 
(bnc#880344). - FS-Cache: Check that there are no read ops when cookie 
relinquished (bnc#880344). - FS-Cache: Clear remaining page count on 
retrieval cancellation (bnc#880344). - FS-Cache: Convert the object event 
ID #defines into an enum (bnc#880344). - FS-Cache: Does not sleep in page 
release if __GFP_FS is not set (bnc#880344). - FS-Cache: Does not use 
spin_is_locked() in assertions (bnc#880344). - FS-Cache: Exclusive op 
submission can BUG if there is been an I/O error (bnc#880344). - FS-Cache: 
Fix __wait_on_atomic_t() to call the action func if the counter != 0 
(bnc#880344). - FS-Cache: Fix object state machine to have separate work 
and wait states (bnc#880344). - FS-Cache: Fix operation state management 
and accounting (bnc#880344). - FS-Cache: Fix signal handling during waits 
(bnc#880344). - FS-Cache: Initialise the object event mask with the 
calculated mask (bnc#880344). - FS-Cache: Limit the number of I/O error 
reports for a cache (bnc#880344). - FS-Cache: Make cookie relinquishment 
wait for outstanding reads (bnc#880344). - FS-Cache: Mark cancellation of 
in-progress operation (bnc#880344). - FS-Cache: One of the write operation 
paths doeses not set the object state (bnc#880344). - FS-Cache: Provide 
proper invalidation (bnc#880344). - FS-Cache: Simplify cookie retention for 
fscache_objects, fixing oops (bnc#880344). - FS-Cache: The retrieval 
remaining-pages counter needs to be atomic_t (bnc#880344). - FS-Cache: 
Uninline fscache_object_init() (bnc#880344). - FS-Cache: Wrap checks on 
object state (bnc#880344). - HID: usbhid: add always-poll quirk 
(bnc#888607). - HID: usbhid: enable always-poll quirk for Elan Touchscreen 
(bnc#888607). - IB/iser: Add TIMEWAIT_EXIT event handling (bnc#890297). - 
Ignore 'flags' change to event_constraint (bnc#876114). - Ignore 
data_src/weight changes to perf_sample_data (bnc#876114). - NFS: Allow more 
operations in an NFSv4.1 request (bnc#890513). - NFS: Clean up helper 
function nfs4_select_rw_stateid() (bnc#888968). - NFS: Does not copy read 
delegation stateids in setattr (bnc#888968). - NFS: Does not use a 
delegation to open a file when returning that delegation (bnc#888968, 
bnc#892200, bnc#893596, bnc#893496) - NFS: Fixes for NFS RCU-walk support 
in line with code going upstream - NFS: Use FS-Cache invalidation 
(bnc#880344). - NFS: allow lockless access to access_cache (bnc#866130). - 
NFS: avoid mountpoint being displayed as ' (deleted)' in /proc/mounts 
(bnc#888591). - NFS: nfs4_do_open should add negative results to the dcache 
(bnc#866130). - NFS: nfs_migrate_page() does not wait for FS-Cache to 
finish with a page (bnc#880344). - NFS: nfs_open_revalidate: only evaluate 
parent if it will be used (bnc#866130). - NFS: prepare for RCU-walk support 
but pushing tests later in code (bnc#866130). - NFS: support RCU_WALK in 
nfs_permission() (bnc#866130). - NFS: teach nfs_lookup_verify_inode to 
handle LOOKUP_RCU (bnc#866130). - NFS: teach nfs_neg_need_reval to 
understand LOOKUP_RCU (bnc#866130). - NFSD: Does not hand out delegations 
for 30 seconds after recalling them (bnc#880370). - NFSv4 set open access 
operation call flag in nfs4_init_opendata_res (bnc#888968, bnc#892200, 
bnc#893596, bnc#893496). - NFSv4: Add a helper for encoding opaque data 
(bnc#888968). - NFSv4: Add a helper for encoding stateids (bnc#888968). - 
NFSv4: Add helpers for basic copying of stateids (bnc#888968). - NFSv4: 
Clean up nfs4_select_rw_stateid() (bnc#888968). - NFSv4: Fix the return 
value of nfs4_select_rw_stateid (bnc#888968). - NFSv4: Rename 
nfs4_copy_stateid() (bnc#888968). - NFSv4: Resend the READ/WRITE RPC call 
if a stateid change causes an error (bnc#888968). - NFSv4: Simplify the 
struct nfs4_stateid (bnc#888968). - NFSv4: The stateid must remain the same 
for replayed RPC calls (bnc#888968). - NFSv4: nfs4_stateid_is_current 
should return 'true' for an invalid stateid (bnc#888968). - One more fix 
for kABI breakage. - PCI: Lock down BAR access when module security is 
enabled (bnc#884333). - PCI: enable MPS 'performance' setting to properly 
handle bridge MPS (bnc#883376). - PM / Hibernate: Add memory_rtree_find_bit 
function (bnc#860441). - PM / Hibernate: Create a Radix-Tree to store 
memory bitmap (bnc#860441). - PM / Hibernate: Implement position keeping in 
radix tree (bnc#860441). - PM / Hibernate: Iterate over set bits instead of 
PFNs in swsusp_free() (bnc#860441). - PM / Hibernate: Remove the old 
memory-bitmap implementation (bnc#860441). - PM / Hibernate: Touch Soft 
Lockup Watchdog in rtree_next_node (bnc#860441). - Restrict /dev/mem and 
/dev/kmem when module loading is restricted (bnc#884333). - Reuse existing 
'state' field to indicate PERF_X86_EVENT_PEBS_LDLAT (bnc#876114). - USB: 
handle LPM errors during device suspend correctly (bnc#849123). - Update 
kabi files to reflect fscache change (bnc#880344) - VFS: Make more complete 
truncate operation available to CacheFiles (bnc#880344). - [FEAT NET1222] 
ib_uverbs: Allow explicit mmio trigger (FATE#83366, ltc#83367). - acpi: 
Ignore acpi_rsdp kernel parameter when module loading is restricted 
(bnc#884333). - af_iucv: correct cleanup if listen backlog is full 
(bnc#885262, LTC#111728). - asus-wmi: Restrict debugfs interface when 
module loading is restricted (bnc#884333). - autofs4: allow RCU-walk to 
walk through autofs4 (bnc#866130). - autofs4: avoid taking fs_lock during 
rcu-walk (bnc#866130). - autofs4: does not take spinlock when not needed in 
autofs4_lookup_expiring (bnc#866130). - autofs4: factor should_expire() out 
of autofs4_expire_indirect (bnc#866130). - autofs4: make 
'autofs4_can_expire' idempotent (bnc#866130). - autofs4: remove a redundant 
assignment (bnc#866130). - autofs: fix lockref lookup (bnc#888591). - 
be2net: add dma_mapping_error() check for dma_map_page() (bnc#881759). - 
block: add cond_resched() to potentially long running ioctl discard loop 
(bnc#884725). - block: fix race between request completion and timeout 
handling (bnc#881051). - cdc-ether: clean packet filter upon probe 
(bnc#876017). - cpuset: Fix memory allocator deadlock (bnc#876590). - 
crypto: Allow CRYPTO_FIPS without MODULE_SIGNATURES. Not all archs have 
them, but some are FIPS certified, with some kernel support. - crypto: fips 
- only panic on bad/missing crypto mod signatures (bnc#887503). - crypto: 
testmgr - allow aesni-intel and ghash_clmulni-intel in fips mode 
(bnc#889451). - dasd: validate request size before building CCW/TCW 
(bnc#891087, LTC#114068). - dm mpath: fix race condition between 
multipath_dtr and pg_init_done (bnc#826486). - dm-mpath: fix panic on 
deleting sg device (bnc#870161). - drm/ast: Add missing entry to 
dclk_table[]. - drm/ast: Add reduced non reduced mode parsing for wide 
screen mode (bnc#892723). - drm/i915: Only apply DPMS to the encoder if 
enabled (bnc#893064). - drm/i915: clear the FPGA_DBG_RM_NOCLAIM bit at 
driver init (bnc#869055). - drm/i915: create functions for the 'unclaimed 
register' checks (bnc#869055). - drm/i915: use FPGA_DBG for the 'unclaimed 
register' checks (bnc#869055). - drm/mgag200: Initialize data needed to map 
fbdev memory (bnc #806990). - e1000e: enable support for new device IDs 
(bnc#885509). - fs/fscache: remove spin_lock() from the condition in 
while() (bnc#880344). - hibernate: Disable in a signed modules environment 
(bnc#884333). - hugetlb: does not use ERR_PTR with VM_FAULT* values - 
ibmvscsi: Abort init sequence during error recovery (bnc#885382). - 
ibmvscsi: Add memory barriers for send / receive (bnc#885382). - inet: add 
a redirect generation id in inetpeer (bnc#860593). - inetpeer: initialize 
-&gt;redirect_genid in inet_getpeer() (bnc#860593). - ipv6: tcp: fix 
tcp_v6_conn_request() (bnc#887645). - kabi: hide bnc#860593 changes of 
struct inetpeer_addr_base (bnc#860593). - kernel: 3215 tty hang 
(bnc#891087, LTC#114562). - kernel: fix data corruption when reading 
/proc/sysinfo (bnc#891087, LTC#114480). - kernel: fix kernel oops with load 
of fpc register (bnc#889061, LTC#113596). - kernel: sclp console tty 
reference counting (bnc#891087, LTC#115466). - kexec: Disable at runtime if 
the kernel enforces module loading restrictions (bnc#884333). - md/raid6: 
avoid data corruption during recovery of double-degraded RAID6. - memcg, 
vmscan: Fix forced scan of anonymous pages (memory reclaim fix). - mm, 
hugetlb: add VM_NORESERVE check in vma_has_reserves() - mm, hugetlb: change 
variable name reservations to resv - mm, hugetlb: decrement reserve count 
if VM_NORESERVE alloc page cache - mm, hugetlb: defer freeing pages when 
gathering surplus pages - mm, hugetlb: do not use a page in page cache for 
cow optimization - mm, hugetlb: fix and clean-up node iteration code to 
alloc or free - mm, hugetlb: fix race in region tracking - mm, hugetlb: fix 
subpool accounting handling - mm, hugetlb: improve page-fault scalability - 
mm, hugetlb: improve, cleanup resv_map parameters - mm, hugetlb: move up 
the code which check availability of free huge page - mm, hugetlb: protect 
reserved pages when soft offlining a hugepage - mm, hugetlb: remove 
decrement_hugepage_resv_vma() - mm, hugetlb: remove redundant list_empty 
check in gather_surplus_pages() - mm, hugetlb: remove resv_map_put - mm, 
hugetlb: remove useless check about mapping type - mm, hugetlb: return a 
reserved page to a reserved pool if failed - mm, hugetlb: trivial 
commenting fix - mm, hugetlb: unify region structure handling - mm, 
hugetlb: unify region structure handling kabi - mm, hugetlb: use long vars 
instead of int in region_count() (Hugetlb Fault Scalability). - mm, 
hugetlb: use vma_resv_map() map types - mm, oom: fix badness score 
underflow (bnc#884582, bnc#884767). - mm, oom: normalize oom scores to 
oom_score_adj scale only for userspace (bnc#884582, bnc#884767). - mm, thp: 
do not allow thp faults to avoid cpuset restrictions (bnc#888849). - 
net/mlx4_core: Load higher level modules according to ports type 
(bnc#887680). - net/mlx4_core: Load the IB driver when the device supports 
IBoE (bnc#887680). - net/mlx4_en: Fix a race between napi poll function and 
RX ring cleanup (bnc#863586). - net/mlx4_en: Fix selftest failing on non 
10G link speed (bnc#888058). - net: fix checksumming features handling in 
output path (bnc#891259). - perf/core: Add weighted samples (bnc#876114). - 
perf/x86: Add flags to event constraints (bnc#876114). - perf/x86: Add 
memory profiling via PEBS Load Latency (bnc#876114). - perf: Add generic 
memory sampling interface (bnc#876114). - qla2xxx: Avoid escalating the 
SCSI error handler if the command is not found in firmware (bnc#859840). - 
qla2xxx: Clear loop_id for ports that are marked lost during fabric 
scanning (bnc#859840). - qla2xxx: Does not check for firmware hung during 
the reset context for ISP82XX (bnc#859840). - qla2xxx: Issue abort command 
for outstanding commands during cleanup when only firmware is alive 
(bnc#859840). - qla2xxx: Reduce the time we wait for a command to complete 
during SCSI error handling (bnc#859840). - qla2xxx: Set host can_queue 
value based on available resources (bnc#859840). - restore smp_mb() in 
unlock_new_inode() (bnc#890526). - s390/pci: introduce lazy IOTLB flushing 
for DMA unmap (bnc#889061, LTC#113725). - sched: fix the theoretical 
signal_wake_up() vs schedule() race (bnc#876055). - sclp_vt220: Enable 
integrated ASCII console per default (bnc#885262, LTC#112035). - scsi_dh: 
use missing accessor 'scsi_device_from_queue' (bnc#889614). - 
scsi_transport_fc: Cap dev_loss_tmo by fast_io_fail (bnc#887608). - 
scsiback: correct grant page unmapping. - scsiback: fix retry handling in 
__report_luns(). - scsiback: free resources after error. - sunrpc/auth: 
allow lockless (rcu) lookup of credential cache (bnc#866130). - 
supported.conf: remove external from drivers/net/veth (bnc#889727) - 
supported.conf: support net/sched/act_police.ko (bnc#890426) - tcp: adapt 
selected parts of RFC 5682 and PRR logic (bnc#879921). - tg3: Change nvram 
command timeout value to 50ms (bnc#855657). - tg3: Override clock, link 
aware and link idle mode during NVRAM dump (bnc#855657). - tg3: Set the MAC 
clock to the fastest speed during boot code load (bnc#855657). - usb: Does 
not enable LPM if the exit latency is zero (bnc#832309). - usbcore: Does 
not log on consecutive debounce failures of the same port (bnc#888105). - 
usbhid: fix PIXART optical mouse (bnc#888607). - uswsusp: Disable when 
module loading is restricted (bnc#884333). - vscsi: support larger transfer 
sizes (bnc#774818). - x86 thermal: Delete power-limit-notification console 
messages (bnc#882317). - x86 thermal: Disable power limit notification 
interrupt by default (bnc#882317). - x86 thermal: Re-enable power limit 
notification interrupt by default (bnc#882317). - x86/UV: Add call to 
KGDB/KDB from NMI handler (bnc#888847). - x86/UV: Add kdump to UV NMI 
handler (bnc#888847). - x86/UV: Add summary of cpu activity to UV NMI 
handler (bnc#888847). - x86/UV: Move NMI support (bnc#888847). - x86/UV: 
Update UV support for external NMI signals (bnc#888847). - x86/uv/nmi: Fix 
Sparse warnings (bnc#888847). - x86: Lock down IO port access when module 
security is enabled (bnc#884333). - x86: Restrict MSR access when module 
loading is restricted (bnc#884333).

Security Issues:

    * CVE-2013-1979
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979&gt;
    * CVE-2014-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739&gt;
    * CVE-2014-2706
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706&gt;
    * CVE-2014-4027
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4027&gt;
    * CVE-2014-4171
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171&gt;
    * CVE-2014-4508
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508&gt;
    * CVE-2014-4667
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667&gt;
    * CVE-2014-4943
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943&gt;
    * CVE-2014-5077
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077&gt;
    * CVE-2014-5471
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471&gt;
    * CVE-2014-5472
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-24"/>
	<updated date="2014-09-24"/>
	<bugzilla href="https://bugzilla.suse.com/774818">SUSE bug 774818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806990">SUSE bug 806990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826486">SUSE bug 826486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/832309">SUSE bug 832309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849123">SUSE bug 849123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855657">SUSE bug 855657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859840">SUSE bug 859840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860441">SUSE bug 860441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860593">SUSE bug 860593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863586">SUSE bug 863586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866130">SUSE bug 866130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866615">SUSE bug 866615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866864">SUSE bug 866864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866911">SUSE bug 866911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869055">SUSE bug 869055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869934">SUSE bug 869934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870161">SUSE bug 870161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876017">SUSE bug 876017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876055">SUSE bug 876055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876114">SUSE bug 876114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876590">SUSE bug 876590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879921">SUSE bug 879921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880344">SUSE bug 880344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880370">SUSE bug 880370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881051">SUSE bug 881051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881759">SUSE bug 881759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882317">SUSE bug 882317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882639">SUSE bug 882639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882804">SUSE bug 882804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882900">SUSE bug 882900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883376">SUSE bug 883376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884582">SUSE bug 884582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884725">SUSE bug 884725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884767">SUSE bug 884767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885262">SUSE bug 885262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885382">SUSE bug 885382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885509">SUSE bug 885509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886840">SUSE bug 886840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887503">SUSE bug 887503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887608">SUSE bug 887608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887645">SUSE bug 887645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887680">SUSE bug 887680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888058">SUSE bug 888058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888105">SUSE bug 888105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888591">SUSE bug 888591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888607">SUSE bug 888607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888847">SUSE bug 888847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888849">SUSE bug 888849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888968">SUSE bug 888968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889061">SUSE bug 889061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889451">SUSE bug 889451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889614">SUSE bug 889614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889727">SUSE bug 889727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890297">SUSE bug 890297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890426">SUSE bug 890426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890513">SUSE bug 890513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890526">SUSE bug 890526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891087">SUSE bug 891087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891259">SUSE bug 891259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891619">SUSE bug 891619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892200">SUSE bug 892200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892723">SUSE bug 892723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893064">SUSE bug 893064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893496">SUSE bug 893496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893596">SUSE bug 893596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894200">SUSE bug 894200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1739/">CVE-2014-1739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4027/">CVE-2014-4027</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566743" comment="kernel-bigsmp-devel-3.0.101-0.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78366" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="926007" ref_url="https://bugzilla.suse.com/926007" source="BUGZILLA"/>
		<reference ref_id="926709" ref_url="https://bugzilla.suse.com/926709" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-8104: Prevent guest to host DoS caused by infinite loop in microcode via #DB exception (bsc#954404).
- CVE-2015-5307: Prevent guest to host DoS caused by infinite loop in microcode via #AC exception (bsc#953527).
- CVE-2015-7990: RDS: Verify the underlying transport exists before creating a connection, preventing possible DoS (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bsc#938706).
- CVE-2015-7872: Possible crash when trying to garbage collect an uninstantiated keyring (bsc#951440).
- CVE-2015-0272: Prevent remote DoS using IPv6 RA with bogus MTU by validating before applying it (bsc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bsc#945825).
- CVE-2015-6252: The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via a VHOST_SET_LOG_FD ioctl call that triggered permanent file-descriptor allocation (bsc#942367).

The following non-security bugs were fixed:
- alsa: hda - Disable 64bit address for Creative HDA controllers (bsc#814440).
- btrfs: fix hang when failing to submit bio of directIO (bsc#942688).
- btrfs: fix memory corruption on failure to submit bio for direct IO (bsc#942688).
- btrfs: fix put dio bio twice when we submit dio bio fail (bsc#942688).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would have merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn merge heuristic (bsc#904348).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add enum hpd_pin to intel_encoder (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Get rid if the '^A' in struct drm_i915_private (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove i965_hpd_irq_setup (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- fix lpfc_send_rscn_event allocation size claims bsc#935757
- hugetlb: simplify migrate_huge_page() (bsc#947957, VM Functionality).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bsc#947957).
- ib/iser: Add Discovery support (bsc#923002).
- ib/iser: Move informational messages from error to info level (bsc#923002).
- ib/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- ib/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- ipv6: fix tunnel error handling (bsc#952579).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ipvs: Fix reuse connection if real server is dead (bsc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- keys: Fix race between key destruction and finding a keyring by name (bsc#951440).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bsc#930788).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- macvlan: Support bonding events bsc#948521
- make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- memory-failure: do code refactor of soft_offline_page() (bsc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bsc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bsc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bsc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bsc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bsc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bsc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bsc#940017, bsc#949298).
- mm: make page pfmemalloc check more robust (bsc#920016).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- pci: Add VPD function 0 quirk for Intel Ethernet devices (bsc#943786).
- pci: Add dev_flags bit to access VPD through function 0 (bsc#943786).
- pci: Add flag indicating device has been assigned by KVM (bsc#777565).
- pci: Clear NumVFs when disabling SR-IOV in sriov_init() (bsc#952084).
- pci: Refresh First VF Offset and VF Stride when updating NumVFs (bsc#952084).
- pci: Update NumVFs register when disabling SR-IOV (bsc#952084).
- pci: delay configuration of SRIOV capability (bsc#952084).
- pci: set pci sriov page size before reading SRIOV BAR (bsc#952084).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- r8169: remember WOL preferences on driver load (bsc#942305).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bsc#949100).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bsc#942204).
- scsi: hosts: update to use ida_simple for host_no (bsc#939926)
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bsc#933721).
- usb: xhci: Reset a halted endpoint immediately when we encounter a stall (bsc#933721).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bsc#944989).
- usb: xhci: do not start a halted endpoint before its new dequeue is set (bsc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bsc#933721).
- x86/tsc: Change Fast TSC calibration failed from error to info (bsc#942605).
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bsc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bsc#930788).
- xfs: add background scanning to clear eofblocks inodes (bsc#930788).
- xfs: add inode id filtering to eofblocks scan (bsc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bsc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bsc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bsc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bsc#930788).
- xfs: support a tag-based inode_ag_iterator (bsc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bsc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bsc#949981).
- xhci: Allocate correct amount of scratchpad buffers (bsc#933721).
- xhci: Calculate old endpoints correctly on device reset (bsc#944831).
- xhci: Do not enable/disable RWE on bus suspend/resume (bsc#933721).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bsc#945691).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bsc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bsc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bsc#933721).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bsc#949502).
- xhci: do not report PLC when link is in internal resume state (bsc#933721).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bsc#944837).
- xhci: fix reporting of 0-sized URBs in control endpoint (bsc#933721).
- xhci: report U3 when link is in resume state (bsc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bsc#933721).
- xhci: use uninterruptible sleep for waiting for internal operations (bsc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926007">SUSE bug 926007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926709">SUSE bug 926709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566744" comment="kernel-bigsmp-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566745" comment="kernel-default-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566746" comment="kernel-default-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566747" comment="kernel-default-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566748" comment="kernel-default-extra-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566749" comment="kernel-pae-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566750" comment="kernel-pae-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566751" comment="kernel-pae-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566752" comment="kernel-pae-extra-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566753" comment="kernel-source-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566754" comment="kernel-syms-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566755" comment="kernel-trace-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566756" comment="kernel-xen-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566757" comment="kernel-xen-base-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566758" comment="kernel-xen-devel-3.0.101-0.47.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566759" comment="kernel-xen-extra-3.0.101-0.47.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78367" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="891082" ref_url="https://bugzilla.suse.com/891082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345/" source="CVE"/>
		<description>

This MIT krb5 update fixes a buffer overrun problem in kadmind:

    * bnc#891082: buffer overrun in kadmind with LDAP back end
      (MITKRB5-SA-2014-001) (CVE-2014-4345)

MIT krb5 Security Advisory 2014-001

    * http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2014-001.txt

Security Issues:

    * CVE-2014-4345
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-12"/>
	<updated date="2014-08-12"/>
	<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566760" comment="krb5-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566761" comment="krb5-32bit-1.6.3-133.49.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566762" comment="krb5-client-1.6.3-133.49.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78368" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566763" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566764" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566765" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78369" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566766" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566767" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566768" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78370" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="890623" ref_url="https://bugzilla.suse.com/890623" source="BUGZILLA"/>
		<reference ref_id="897874" ref_url="https://bugzilla.suse.com/897874" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<description>

This update for krb5 fixes the following issues:

    * When randomizing the keys for a service principal, current keys could
      be returned. (CVE-2014-5351)
    * klist -s crashes when handling multiple referral entries.
      (bnc#890623)

Security Issues:

    * CVE-2014-5351
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/890623">SUSE bug 890623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566769" comment="krb5-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566770" comment="krb5-32bit-1.6.3-133.49.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566771" comment="krb5-client-1.6.3-133.49.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78371" version="1" class="patch">
	<metadata>
		<title>Security update for krb5</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="906557" ref_url="https://bugzilla.suse.com/906557" source="BUGZILLA"/>
		<reference ref_id="912002" ref_url="https://bugzilla.suse.com/912002" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<description>

krb5 has been updated to fix four security issues:

    * CVE-2014-5352: gss_process_context_token() incorrectly frees context
      (bsc#912002)
    * CVE-2014-9421: kadmind doubly frees partial deserialization results
      (bsc#912002)
    * CVE-2014-9422: kadmind incorrectly validates server principal name
      (bsc#912002)
    * CVE-2014-9423: libgssrpc server applications leak uninitialized bytes
      (bsc#912002)

Additionally, these non-security issues have been fixed:

    * Winbind process hangs indefinitely without DC. (bsc#872912)
    * Hanging winbind processes. (bsc#906557)

Security Issues:

    * CVE-2014-5352
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352&gt;
    * CVE-2014-9421
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421&gt;
    * CVE-2014-9422
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422&gt;
    * CVE-2014-9423
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-06"/>
	<updated date="2015-02-06"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906557">SUSE bug 906557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566772" comment="krb5-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566773" comment="krb5-32bit-1.6.3-133.49.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566774" comment="krb5-client-1.6.3-133.49.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78372" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-09"/>
	<updated date="2015-07-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566775" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566776" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566777" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78373" version="1" class="patch">
	<metadata>
		<title>Security update for kvm</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="876842" ref_url="https://bugzilla.suse.com/876842" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="877645" ref_url="https://bugzilla.suse.com/877645" source="BUGZILLA"/>
		<reference ref_id="878541" ref_url="https://bugzilla.suse.com/878541" source="BUGZILLA"/>
		<reference ref_id="886535" ref_url="https://bugzilla.suse.com/886535" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00006.html" source="SUSE-SU"/>
		<description>

kvm has been updated to fix issues in the embedded qemu:

    * 

      CVE-2014-0223: An integer overflow flaw was found in the QEMU block
      driver for QCOW version 1 disk images. A user able to alter the QEMU
      disk image files loaded by a guest could have used this flaw to
      corrupt QEMU process memory on the host, which could potentially have
      resulted in arbitrary code execution on the host with the privileges
      of the QEMU process.

    * 

      CVE-2014-3461: A user able to alter the savevm data (either on the
      disk or over the wire during migration) could have used this flaw to
      to corrupt QEMU process memory on the (destination) host, which could
      have potentially resulted in arbitrary code execution on the host
      with the privileges of the QEMU process.

    * 

      CVE-2014-0222: An integer overflow flaw was found in the QEMU block
      driver for QCOW version 1 disk images. A user able to alter the QEMU
      disk image files loaded by a guest could have used this flaw to
      corrupt QEMU process memory on the host, which could have potentially
      resulted in arbitrary code execution on the host with the privileges
      of the QEMU process.

Non-security bugs fixed:

    * Fix exceeding IRQ routes that could have caused freezes of guests.
      (bnc#876842)
    * Fix CPUID emulation bugs that may have broken Windows guests with
      newer -cpu types (bnc#886535)

Security Issues:

    * CVE-2014-0222
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222&gt;
    * CVE-2014-0223
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223&gt;
    * CVE-2014-3461
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-19"/>
	<updated date="2014-09-19"/>
	<bugzilla href="https://bugzilla.suse.com/876842">SUSE bug 876842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878541">SUSE bug 878541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886535">SUSE bug 886535</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566778" comment="kvm-1.4.2-0.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78374" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00000.html" source="SUSE-SU"/>
		<description>
kvm was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-21"/>
	<updated date="2015-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566779" comment="kvm-1.4.2-0.22.34.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78375" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="947164" ref_url="https://bugzilla.suse.com/947164" source="BUGZILLA"/>
		<reference ref_id="950590" ref_url="https://bugzilla.suse.com/950590" source="BUGZILLA"/>
		<reference ref_id="953187" ref_url="https://bugzilla.suse.com/953187" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00001.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes the following issues: 

Security issues fixed:
- CVE-2015-7512: The receive packet size is now checked in the emulated
  pcnet driver, eliminating buffer overflow and potential security
  issue by malicious guest systems. (bsc#957162)
- CVE-2015-8345: A infinite loop in processing command block list was fixed that could be
  exploit by malicious guest systems (bsc#956829).

Bugs fixed:
- Fix cases of wrong clock values in kvmclock timekeeping
  (bsc#947164 and bsc#953187)
- Enforce pxe rom sizes to ensure migration compatibility.
  (bsc#950590)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947164">SUSE bug 947164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950590">SUSE bug 950590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953187">SUSE bug 953187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566780" comment="kvm-1.4.2-37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78376" version="1" class="patch">
	<metadata>
		<title>Security update for kvm and libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843074" ref_url="https://bugzilla.suse.com/843074" source="BUGZILLA"/>
		<reference ref_id="852397" ref_url="https://bugzilla.suse.com/852397" source="BUGZILLA"/>
		<reference ref_id="878350" ref_url="https://bugzilla.suse.com/878350" source="BUGZILLA"/>
		<reference ref_id="879665" ref_url="https://bugzilla.suse.com/879665" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="897783" ref_url="https://bugzilla.suse.com/897783" source="BUGZILLA"/>
		<reference ref_id="899144" ref_url="https://bugzilla.suse.com/899144" source="BUGZILLA"/>
		<reference ref_id="899484" ref_url="https://bugzilla.suse.com/899484" source="BUGZILLA"/>
		<reference ref_id="900084" ref_url="https://bugzilla.suse.com/900084" source="BUGZILLA"/>
		<reference ref_id="904176" ref_url="https://bugzilla.suse.com/904176" source="BUGZILLA"/>
		<reference ref_id="905097" ref_url="https://bugzilla.suse.com/905097" source="BUGZILLA"/>
		<reference ref_id="907805" ref_url="https://bugzilla.suse.com/907805" source="BUGZILLA"/>
		<reference ref_id="908381" ref_url="https://bugzilla.suse.com/908381" source="BUGZILLA"/>
		<reference ref_id="910145" ref_url="https://bugzilla.suse.com/910145" source="BUGZILLA"/>
		<reference ref_id="911742" ref_url="https://bugzilla.suse.com/911742" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657/" source="CVE"/>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<description>

This collective update for KVM and libvirt provides fixes for security and 
non-security issues.

kvm:

    * Fix NULL pointer dereference because of uninitialized UDP socket.
      (bsc#897654, CVE-2014-3640)
    * Fix performance degradation after migration. (bsc#878350)
    * Fix potential image corruption due to missing FIEMAP_FLAG_SYNC flag
      in FS_IOC_FIEMAP ioctl. (bsc#908381)
    * Add validate hex properties for qdev. (bsc#852397)
    * Add boot option to do strict boot (bsc#900084)
    * Add query-command-line-options QMP command. (bsc#899144)
    * Fix incorrect return value of migrate_cancel. (bsc#843074)
    * Fix insufficient parameter validation during ram load. (bsc#905097,
      CVE-2014-7840)
    * Fix insufficient blit region checks in qemu/cirrus. (bsc#907805,
      CVE-2014-8106)

libvirt:

    * Fix security hole with migratable flag in dumpxml. (bsc#904176,
      CVE-2014-7823)
    * Fix domain deadlock. (bsc#899484, CVE-2014-3657)
    * Use correct definition when looking up disk in qemu blkiotune.
      (bsc#897783, CVE-2014-3633)
    * Fix undefined symbol when starting virtlockd. (bsc#910145)
    * Add '-boot strict' to qemu's commandline whenever possible.
      (bsc#900084)
    * Add support for 'reboot-timeout' in qemu. (bsc#899144)
    * Increase QEMU's monitor timeout to 30sec. (bsc#911742)
    * Allow setting QEMU's migration max downtime any time. (bsc#879665)

Security Issues:

    * CVE-2014-7823
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823&gt;
    * CVE-2014-3657
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657&gt;
    * CVE-2014-3633
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633&gt;
    * CVE-2014-3640
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640&gt;
    * CVE-2014-7840
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840&gt;
    * CVE-2014-8106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/843074">SUSE bug 843074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852397">SUSE bug 852397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878350">SUSE bug 878350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879665">SUSE bug 879665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899144">SUSE bug 899144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900084">SUSE bug 900084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908381">SUSE bug 908381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910145">SUSE bug 910145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911742">SUSE bug 911742</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566781" comment="kvm-1.4.2-0.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566782" comment="libvirt-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566783" comment="libvirt-client-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566784" comment="libvirt-client-32bit-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566785" comment="libvirt-doc-1.0.5.9-0.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566786" comment="libvirt-python-1.0.5.9-0.19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78377" version="1" class="patch">
	<metadata>
		<title>Security update for lcms</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843716" ref_url="https://bugzilla.suse.com/843716" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276/" source="CVE"/>
		<description>

The lcms userland utilities were updated to fix stack overflows.

    * CVE-2013-4276: Multiple stack-based buffer overflows in LittleCMS
      allowed remote attackers to cause a denial of service (crash) via a
      crafted (1) ICC color profile to the icctrans utility or (2) TIFF
      image to the tiffdiff utility.

Security Issues:

    * CVE-2013-4276
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-08"/>
	<updated date="2013-10-08"/>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566059" comment="lcms-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566060" comment="liblcms1-1.17-77.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566061" comment="liblcms1-32bit-1.17-77.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78378" version="1" class="patch">
	<metadata>
		<title>Security update for lcms2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="826097" ref_url="https://bugzilla.suse.com/826097" source="BUGZILLA"/>
		<description>

lcms2 has been updated to the version 2.5 which is a maintenance release to 
fix various security and other bugs.

    * User defined parametric curves can now be saved in ICC profiles.
    * RGB profiles using same tone curves for several channels are storing
      now only one copy of the curve
    * update black point detection algorithm to reflect ICC changes
    * Added new cmsPlugInTHR() and fixed some race conditions
    * Added error descriptions on cmsSmoothToneCurve
    * Several improvements in cgats parser.
    * Fixed devicelink generation for 8 bits
    * Added a reference for Mac MLU tag
    * Added a way to read the profile creator from header
    * Added identity curves support for write V2 LUT
    * Added TIFF Lab16 handling on tifficc
    * Fixed a bug in parametric curves
    * Rendering intent used when creating the transform is now propagated
      to profile header in cmsTransform2Devicelink.
    * Transform2Devicelink now keeps white point when guessing deviceclass
      is enabled
    * Added some checks for non-happy path, mostly failing mallocs
      (bnc#826097).

For further changes please see the ChangeLog in the RPM.

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-19"/>
	<updated date="2013-07-19"/>
	<bugzilla href="https://bugzilla.suse.com/826097">SUSE bug 826097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566787" comment="lcms2-2.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566788" comment="liblcms2-2-2.5-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78379" version="1" class="patch">
	<metadata>
		<title>Security update for libQt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="856832" ref_url="https://bugzilla.suse.com/856832" source="BUGZILLA"/>
		<reference ref_id="859158" ref_url="https://bugzilla.suse.com/859158" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549/" source="CVE"/>
		<description>

The Qt library was updated to fix a XML entity expansion attack (XXE). 
(CVE-2013-4549)

Security Issue reference:

    * CVE-2013-4549
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-15"/>
	<updated date="2014-02-15"/>
	<bugzilla href="https://bugzilla.suse.com/856832">SUSE bug 856832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859158">SUSE bug 859158</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566789" comment="libQtWebKit4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566790" comment="libQtWebKit4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566791" comment="libqt4-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566792" comment="libqt4-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566793" comment="libqt4-qt3support-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566794" comment="libqt4-qt3support-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566795" comment="libqt4-sql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566796" comment="libqt4-sql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566797" comment="libqt4-sql-mysql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566798" comment="libqt4-sql-mysql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566799" comment="libqt4-sql-postgresql-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566800" comment="libqt4-sql-postgresql-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566801" comment="libqt4-sql-sqlite-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566802" comment="libqt4-sql-sqlite-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566803" comment="libqt4-sql-unixODBC-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566804" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566805" comment="libqt4-x11-4.6.3-5.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566806" comment="libqt4-x11-32bit-4.6.3-5.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78380" version="1" class="patch">
	<metadata>
		<title>Security update for PostgreSQL 9.1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="864845" ref_url="https://bugzilla.suse.com/864845" source="BUGZILLA"/>
		<reference ref_id="864846" ref_url="https://bugzilla.suse.com/864846" source="BUGZILLA"/>
		<reference ref_id="864847" ref_url="https://bugzilla.suse.com/864847" source="BUGZILLA"/>
		<reference ref_id="864850" ref_url="https://bugzilla.suse.com/864850" source="BUGZILLA"/>
		<reference ref_id="864851" ref_url="https://bugzilla.suse.com/864851" source="BUGZILLA"/>
		<reference ref_id="864852" ref_url="https://bugzilla.suse.com/864852" source="BUGZILLA"/>
		<reference ref_id="864853" ref_url="https://bugzilla.suse.com/864853" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060/" source="CVE"/>
		<reference ref_id="CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061/" source="CVE"/>
		<reference ref_id="CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062/" source="CVE"/>
		<reference ref_id="CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063/" source="CVE"/>
		<reference ref_id="CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064/" source="CVE"/>
		<reference ref_id="CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065/" source="CVE"/>
		<reference ref_id="CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066/" source="CVE"/>
		<description>

The PostgreSQL database server was updated to version 9.1.12 to fix various 
security issues:

    * 

      Granting a role without ADMIN OPTION is supposed to prevent the
      grantee from adding or removing members from the granted role, but
      this restriction was easily bypassed by doing SET ROLE first. The
      security impact is mostly that a role member can revoke the access of
      others, contrary to the wishes of his grantor. Unapproved role member
      additions are a lesser concern, since an uncooperative role member
      could provide most of his rights to others anyway by creating views
      or SECURITY DEFINER functions. (CVE-2014-0060)

    * 

      The primary role of PL validator functions is to be called implicitly
      during CREATE FUNCTION, but they are also normal SQL functions that a
      user can call explicitly. Calling a validator on a function actually
      written in some other language was not checked for and could be
      exploited for privilege-escalation purposes. The fix involves adding
      a call to a privilege-checking function in each validator function.
      Non-core procedural languages will also need to make this change to
      their own validator functions, if any. (CVE-2014-0061)

    * 

      If the name lookups come to different conclusions due to concurrent
      activity, we might perform some parts of the DDL on a different table
      than other parts. At least in the case of CREATE INDEX, this can be
      used to cause the permissions checks to be performed against a
      different table than the index creation, allowing for a privilege
      escalation attack. (CVE-2014-0062)

    * 

      The MAXDATELEN constant was too small for the longest possible value
      of type interval, allowing a buffer overrun in interval_out().
      Although the datetime input functions were more careful about
      avoiding buffer overrun, the limit was short enough to cause them to
      reject some valid inputs, such as input containing a very long
      timezone name. The ecpg library contained these vulnerabilities along
      with some of its own. (CVE-2014-0063)

    * 

      Several functions, mostly type input functions, calculated an
      allocation size without checking for overflow. If overflow did occur,
      a too-small buffer would be allocated and then written past.
      (CVE-2014-0064)

    * 

      Use strlcpy() and related functions to provide a clear guarantee that
      fixed-size buffers are not overrun. Unlike the preceding items, it is
      unclear whether these cases really represent live issues, since in
      most cases there appear to be previous constraints on the size of the
      input string. Nonetheless it seems prudent to silence all Coverity
      warnings of this type. (CVE-2014-0065)

    * 

      There are relatively few scenarios in which crypt() could return
      NULL, but contrib/chkpass would crash if it did. One practical case
      in which this could be an issue is if libc is configured to refuse to
      execute unapproved hashing algorithms (e.g., 'FIPS mode').
      (CVE-2014-0066)

    * 

      Since the temporary server started by make check uses 'trust'
      authentication, another user on the same machine could connect to it
      as database superuser, and then potentially exploit the privileges of
      the operating-system user who started the tests. A future release
      will probably incorporate changes in the testing procedure to prevent
      this risk, but some public discussion is needed first. So for the
      moment, just warn people against using make check when there are
      untrusted users on the same machine. (CVE-2014-0067)

The complete list of bugs and more information can be found at: 
http://www.postgresql.org/docs/9.1/static/release-9-1-12.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-12.html&gt;

Security Issues references:

    * CVE-2014-0060
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060&gt;
    * CVE-2014-0061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061&gt;
    * CVE-2014-0062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062&gt;
    * CVE-2014-0063
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063&gt;
    * CVE-2014-0064
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064&gt;
    * CVE-2014-0065
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065&gt;
    * CVE-2014-0066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-03"/>
	<updated date="2014-03-03"/>
	<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566807" comment="libecpg6-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566808" comment="libpq5-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566809" comment="libpq5-32bit-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566810" comment="postgresql91-9.1.12-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566811" comment="postgresql91-docs-9.1.12-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78381" version="1" class="patch">
	<metadata>
		<title>Security update for libevent</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="897243" ref_url="https://bugzilla.suse.com/897243" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>

This update fixes a buffer overflow in the buffered event handling in 
libevent. (CVE-2014-6272)

Security Issues:

    * CVE-2014-6272
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-06"/>
	<updated date="2014-10-06"/>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566812" comment="libevent-1_4-2-1.4.5-24.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78382" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="897890" ref_url="https://bugzilla.suse.com/897890" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568/" source="CVE"/>
		<description>

Mozilla NSS was updated to version 3.16.5 to fix a RSA certificate forgery 
issue.

MFSA 2014-73 / CVE-2014-1568: Antoine Delignat-Lavaud, security researcher 
at Inria Paris in team Prosecco, reported an issue in Network Security 
Services (NSS) libraries affecting all versions. He discovered that NSS is 
vulnerable to a variant of a signature forgery attack previously published 
by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values 
involved in a signature and could lead to the forging of RSA certificates.

The Advanced Threat Research team at Intel Security also independently 
discovered and reported this issue.

Security Issues:

    * CVE-2014-1568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-26"/>
	<updated date="2014-09-26"/>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566813" comment="libfreebl3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566814" comment="libfreebl3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566815" comment="libsoftokn3-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566816" comment="libsoftokn3-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566817" comment="mozilla-nss-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566818" comment="mozilla-nss-32bit-3.16.5-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566819" comment="mozilla-nss-tools-3.16.5-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78383" version="1" class="patch">
	<metadata>
		<title>Security update for libgadu</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="878540" ref_url="https://bugzilla.suse.com/878540" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<description>

A memory corruption vulnerability has been fixed in libgadu. CVE-2013-6487 
has been assigned to this issue.

Security Issue reference:

    * CVE-2013-6487
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-21"/>
	<updated date="2014-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/878540">SUSE bug 878540</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566820" comment="libgadu-1.8.2-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78384" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="831359" ref_url="https://bugzilla.suse.com/831359" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242/" source="CVE"/>
		<description>

This update of libgcrypt mitigates the Yarom/Falkner flush+reload 
side-channel attack on RSA secret keys (CVE-2013-4242).

Security Issue reference:

    * CVE-2013-4242
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-13"/>
	<updated date="2013-08-13"/>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566104" comment="libgcrypt11-1.5.0-0.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566105" comment="libgcrypt11-32bit-1.5.0-0.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78385" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566821" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566822" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78386" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="892464" ref_url="https://bugzilla.suse.com/892464" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5270" ref_url="https://www.suse.com/security/cve/CVE-2014-5270/" source="CVE"/>
		<description>

This libgcrypt update fixes the following security issue:

    * bnc#892464: Side-channel attack on Elgamal encryption subkeys.
      (CVE-2014-5270)

Security Issues:

    * CVE-2014-5270
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/892464">SUSE bug 892464</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5270/">CVE-2014-5270</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566823" comment="libgcrypt11-1.5.0-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566824" comment="libgcrypt11-32bit-1.5.0-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78387" version="1" class="patch">
	<metadata>
		<title>Security update for libjasper</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="906364" ref_url="https://bugzilla.suse.com/906364" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<description>

This update for libjasper fixes multiple off-by-one errors which could 
allow remote attackers to execute arbitrary code via a heap-based buffer 
overflow triggered by a crafted jp2 (JPEG 2000) file. (bsc#906364, 
CVE-2014-9029)

Security Issues:

    * CVE-2014-9029
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-04"/>
	<updated date="2014-12-04"/>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566825" comment="libjasper-1.900.1-134.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566826" comment="libjasper-32bit-1.900.1-134.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78388" version="1" class="patch">
	<metadata>
		<title>Security update for libksba
</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="907074" ref_url="https://bugzilla.suse.com/907074" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<description>

This libksba update fixes the following security issue:

    * bnc#907074: buffer overflow in ksba_oid_to_str (CVE-2014-9087)

Security Issues:

    * CVE-2014-9087
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-11"/>
	<updated date="2014-12-11"/>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566827" comment="libksba-1.0.4-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78389" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001774.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566828" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78390" version="1" class="patch">
	<metadata>
		<title>Security update for lzo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="883947" ref_url="https://bugzilla.suse.com/883947" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>

lzo was updated to fix a potential denial of service issue or possible 
remote code execution by allowing an attacker, if the LZO decompression 
algorithm is used in a threaded or kernel context, to corrupt memory 
structures that control the flow of execution in other contexts. 
(CVE-2014-4607)

Security Issue reference:

    * CVE-2014-4607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-11"/>
	<updated date="2014-07-11"/>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566829" comment="liblzo2-2-2.03-12.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566830" comment="liblzo2-2-32bit-2.03-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78391" version="1" class="patch">
	<metadata>
		<title>Security update for libmpfr</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="911812" ref_url="https://bugzilla.suse.com/911812" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>

This update for libmpfr fixes a buffer overflow in mpfr_strtofr. 
(CVE-2014-9474)

Security Issues:

    * CVE-2014-9474
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566831" comment="libmpfr1-2.3.2-3.118.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78392" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="912214" ref_url="https://bugzilla.suse.com/912214" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001290.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issue:

    * CVE-2014-9556: An integer overflow in the function qtmd_decompress()
      could have been exploited causing a denial of service (endless loop)
      (bnc##912214)

Security Issues:

    * CVE-2014-9556
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-05"/>
	<updated date="2015-03-05"/>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566832" comment="libmspack0-0.0.20060920alpha-74.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78393" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566833" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78394" version="1" class="patch">
	<metadata>
		<title>Security update for MySQL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="887580" ref_url="https://bugzilla.suse.com/887580" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2484" ref_url="https://www.suse.com/security/cve/CVE-2014-2484/" source="CVE"/>
		<reference ref_id="CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494/" source="CVE"/>
		<reference ref_id="CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207/" source="CVE"/>
		<reference ref_id="CVE-2014-4214" ref_url="https://www.suse.com/security/cve/CVE-2014-4214/" source="CVE"/>
		<reference ref_id="CVE-2014-4233" ref_url="https://www.suse.com/security/cve/CVE-2014-4233/" source="CVE"/>
		<reference ref_id="CVE-2014-4238" ref_url="https://www.suse.com/security/cve/CVE-2014-4238/" source="CVE"/>
		<reference ref_id="CVE-2014-4240" ref_url="https://www.suse.com/security/cve/CVE-2014-4240/" source="CVE"/>
		<reference ref_id="CVE-2014-4243" ref_url="https://www.suse.com/security/cve/CVE-2014-4243/" source="CVE"/>
		<reference ref_id="CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258/" source="CVE"/>
		<reference ref_id="CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html" source="SUSE-SU"/>
		<description>

This MySQL update provides the following:

    * upgrade to version 5.5.39, [bnc#887580]
    * CVE's fixed: CVE-2014-2484, CVE-2014-4258, CVE-2014-4260,
      CVE-2014-2494, CVE-2014-4238, CVE-2014-4207, CVE-2014-4233,
      CVE-2014-4240, CVE-2014-4214, CVE-2014-4243

See also:
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
&lt;http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html&gt;

Security Issues:

    * CVE-2014-2484
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2484&gt;
    * CVE-2014-4258
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258&gt;
    * CVE-2014-4260
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260&gt;
    * CVE-2014-2494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494&gt;
    * CVE-2014-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4238&gt;
    * CVE-2014-4207
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207&gt;
    * CVE-2014-4233
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4233&gt;
    * CVE-2014-4240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4240&gt;
    * CVE-2014-4214
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4214&gt;
    * CVE-2014-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4243&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-20"/>
	<updated date="2014-08-20"/>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2484/">CVE-2014-2484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4214/">CVE-2014-4214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4233/">CVE-2014-4233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4238/">CVE-2014-4238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4240/">CVE-2014-4240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4243/">CVE-2014-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566834" comment="libmysql55client18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566835" comment="libmysql55client18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566836" comment="libmysql55client_r18-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566837" comment="libmysql55client_r18-32bit-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566838" comment="libmysqlclient15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566839" comment="libmysqlclient15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566840" comment="libmysqlclient_r15-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566841" comment="libmysqlclient_r15-32bit-5.0.96-0.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566842" comment="mysql-5.5.39-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566843" comment="mysql-client-5.5.39-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78395" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSSL</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="892403" ref_url="https://bugzilla.suse.com/892403" source="BUGZILLA"/>
		<reference ref_id="901223" ref_url="https://bugzilla.suse.com/901223" source="BUGZILLA"/>
		<reference ref_id="901277" ref_url="https://bugzilla.suse.com/901277" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<description>

This OpenSSL update fixes the following issues:

    * Session Ticket Memory Leak (CVE-2014-3567)
    * Build option no-ssl3 is incomplete (CVE-2014-3568)
    * Add support for TLS_FALLBACK_SCSV to mitigate CVE-2014-3566 (POODLE)

Security Issues:

    * CVE-2014-3567
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567&gt;
    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;
    * CVE-2014-3568
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-25"/>
	<updated date="2014-10-25"/>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566844" comment="libopenssl0_9_8-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566845" comment="libopenssl0_9_8-32bit-0.9.8j-0.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566846" comment="openssl-0.9.8j-0.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78396" version="1" class="patch">
	<metadata>
		<title>Security update for pixman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="853824" ref_url="https://bugzilla.suse.com/853824" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6425" ref_url="https://www.suse.com/security/cve/CVE-2013-6425/" source="CVE"/>
		<description>

This update fixes the following security issue with pixman:

    * Integer underflow when handling trapezoids. (bnc#853824,
      CVE-2013-6425)

Security Issues:

    * CVE-2013-6425
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-12-21"/>
	<updated date="2013-12-21"/>
	<bugzilla href="https://bugzilla.suse.com/853824">SUSE bug 853824</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6425/">CVE-2013-6425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566847" comment="libpixman-1-0-0.24.4-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566848" comment="libpixman-1-0-32bit-0.24.4-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78397" version="1" class="patch">
	<metadata>
		<title>Security update for libpng</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="873123" ref_url="https://bugzilla.suse.com/873123" source="BUGZILLA"/>
		<reference ref_id="873124" ref_url="https://bugzilla.suse.com/873124" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<description>

This libpng update fixes the following two overflow security issues.

    * bnc#873123: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_sPLT() and png_set_text_2()
      (CVE-2013-7354).
    * bnc#873124: Fixed integer overflow that could have lead to a
      heap-based buffer overflow in png_set_unknown_chunks()
      (CVE-2013-7353).

Security Issue references:

    * CVE-2013-7353
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353&gt;
    * CVE-2013-7354
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-29"/>
	<updated date="2014-04-29"/>
	<bugzilla href="https://bugzilla.suse.com/873123">SUSE bug 873123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873124">SUSE bug 873124</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566849" comment="libpng12-0-1.2.31-5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566850" comment="libpng12-0-32bit-1.2.31-5.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78398" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566851" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566852" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78399" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566853" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566854" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78400" version="1" class="patch">
	<metadata>
		<title>Security update for poppler</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="845765" ref_url="https://bugzilla.suse.com/845765" source="BUGZILLA"/>
		<reference ref_id="CVE-2010-5110" ref_url="https://www.suse.com/security/cve/CVE-2010-5110/" source="CVE"/>
		<description>

This update fixes problems in DCTStream error handling in poppler.

Security Issue reference:

    * CVE-2010-5110
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5110&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-21"/>
	<updated date="2014-05-21"/>
	<bugzilla href="https://bugzilla.suse.com/845765">SUSE bug 845765</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5110/">CVE-2010-5110</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566855" comment="libpoppler-glib4-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566856" comment="libpoppler-qt4-3-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566857" comment="libpoppler5-0.12.3-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563470" comment="poppler-tools-0.12.3-1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78401" version="1" class="patch">
	<metadata>
		<title>Security update for pulseaudio</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="881524" ref_url="https://bugzilla.suse.com/881524" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970/" source="CVE"/>
		<description>

The following security issue is fixed in this update:

    * CVE-2014-3970: Fixed a remote denial of service attack in
      module-rtp-recv.

Security Issues:

    * CVE-2014-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-29"/>
	<updated date="2014-07-29"/>
	<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566858" comment="libpulse-browse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566859" comment="libpulse-mainloop-glib0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566860" comment="libpulse0-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566861" comment="libpulse0-32bit-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566862" comment="pulseaudio-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566863" comment="pulseaudio-esound-compat-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566864" comment="pulseaudio-gdm-hooks-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566865" comment="pulseaudio-lang-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566866" comment="pulseaudio-module-bluetooth-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566867" comment="pulseaudio-module-gconf-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566868" comment="pulseaudio-module-jack-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566869" comment="pulseaudio-module-lirc-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566870" comment="pulseaudio-module-x11-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566871" comment="pulseaudio-module-zeroconf-0.9.23-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566872" comment="pulseaudio-utils-0.9.23-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78402" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="865241" ref_url="https://bugzilla.suse.com/865241" source="BUGZILLA"/>
		<description>

This update of the QT4 QSSL interface makes it select a set of default 
ciphers that is recommended for current usage. This update is needed for 
Konqueror to restrict its cipher set when using https.

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-03"/>
	<updated date="2014-09-03"/>
	<bugzilla href="https://bugzilla.suse.com/865241">SUSE bug 865241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566873" comment="libQtWebKit4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566874" comment="libQtWebKit4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566875" comment="libqt4-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566876" comment="libqt4-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566877" comment="libqt4-qt3support-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566878" comment="libqt4-qt3support-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566879" comment="libqt4-sql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566880" comment="libqt4-sql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566881" comment="libqt4-sql-mysql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566882" comment="libqt4-sql-mysql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566883" comment="libqt4-sql-postgresql-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566884" comment="libqt4-sql-postgresql-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566885" comment="libqt4-sql-sqlite-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566886" comment="libqt4-sql-sqlite-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566887" comment="libqt4-sql-unixODBC-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566888" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566889" comment="libqt4-x11-4.6.3-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566890" comment="libqt4-x11-32bit-4.6.3-5.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78403" version="1" class="patch">
	<metadata>
		<title>Security update for libqt4</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="921999" ref_url="https://bugzilla.suse.com/921999" source="BUGZILLA"/>
		<reference ref_id="927806" ref_url="https://bugzilla.suse.com/927806" source="BUGZILLA"/>
		<reference ref_id="927807" ref_url="https://bugzilla.suse.com/927807" source="BUGZILLA"/>
		<reference ref_id="927808" ref_url="https://bugzilla.suse.com/927808" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858/" source="CVE"/>
		<reference ref_id="CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859/" source="CVE"/>
		<reference ref_id="CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<description>

The libqt4 library was updated to fix several security issues:

    * CVE-2015-0295: Division by zero when processing malformed BMP files.
      (bsc#921999)
    * CVE-2015-1858: Segmentation fault in BMP Qt Image Format Handling.
      (bsc#927806)
    * CVE-2015-1859: Segmentation fault in ICO Qt Image Format Handling.
      (bsc#927807)
    * CVE-2015-1860: Segmentation fault in GIF Qt Image Format Handling.
      (bsc#927808)

Security Issues:

    * CVE-2015-1858
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858&gt;
    * CVE-2015-1859
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859&gt;
    * CVE-2015-1860
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860&gt;
    * CVE-2015-0295
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-12"/>
	<updated date="2015-05-12"/>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566891" comment="libQtWebKit4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566892" comment="libQtWebKit4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566893" comment="libqt4-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566894" comment="libqt4-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566895" comment="libqt4-qt3support-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566896" comment="libqt4-qt3support-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566897" comment="libqt4-sql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566898" comment="libqt4-sql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566899" comment="libqt4-sql-mysql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566900" comment="libqt4-sql-mysql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566901" comment="libqt4-sql-postgresql-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566902" comment="libqt4-sql-postgresql-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566903" comment="libqt4-sql-sqlite-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566904" comment="libqt4-sql-sqlite-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566905" comment="libqt4-sql-unixODBC-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566906" comment="libqt4-sql-unixODBC-32bit-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566907" comment="libqt4-x11-4.6.3-5.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566908" comment="libqt4-x11-32bit-4.6.3-5.34.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78404" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="900214" ref_url="https://bugzilla.suse.com/900214" source="BUGZILLA"/>
		<reference ref_id="900218" ref_url="https://bugzilla.suse.com/900218" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<description>

LibreOffice was updated to fix two security issues.

These security issues have been fixed:

    * 'Document as E-mail' vulnerability (bnc#900218).
    * Impress remote control use-after-free vulnerability (CVE-2014-3693).

Security Issues:

    * CVE-2014-3693
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3693&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-20"/>
	<updated date="2014-11-20"/>
	<bugzilla href="https://bugzilla.suse.com/900214">SUSE bug 900214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900218">SUSE bug 900218</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563504" comment="libreoffice-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563505" comment="libreoffice-base-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563506" comment="libreoffice-base-drivers-postgresql-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563507" comment="libreoffice-base-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563509" comment="libreoffice-calc-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563510" comment="libreoffice-calc-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563511" comment="libreoffice-draw-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563512" comment="libreoffice-draw-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563513" comment="libreoffice-filters-optional-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563514" comment="libreoffice-gnome-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563515" comment="libreoffice-help-cs-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563516" comment="libreoffice-help-da-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563517" comment="libreoffice-help-de-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563518" comment="libreoffice-help-en-GB-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563519" comment="libreoffice-help-en-US-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563520" comment="libreoffice-help-es-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563521" comment="libreoffice-help-fr-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563522" comment="libreoffice-help-gu-IN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563523" comment="libreoffice-help-hi-IN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563524" comment="libreoffice-help-hu-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563525" comment="libreoffice-help-it-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563526" comment="libreoffice-help-ja-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563527" comment="libreoffice-help-ko-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563528" comment="libreoffice-help-nl-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563529" comment="libreoffice-help-pl-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563530" comment="libreoffice-help-pt-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563531" comment="libreoffice-help-pt-BR-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563532" comment="libreoffice-help-ru-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563533" comment="libreoffice-help-sv-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563534" comment="libreoffice-help-zh-CN-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563535" comment="libreoffice-help-zh-TW-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563536" comment="libreoffice-icon-themes-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563537" comment="libreoffice-impress-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563538" comment="libreoffice-impress-extensions-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563539" comment="libreoffice-kde-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563540" comment="libreoffice-kde4-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563541" comment="libreoffice-l10n-af-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563542" comment="libreoffice-l10n-ar-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563543" comment="libreoffice-l10n-ca-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563544" comment="libreoffice-l10n-cs-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563545" comment="libreoffice-l10n-da-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563546" comment="libreoffice-l10n-de-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563548" comment="libreoffice-l10n-en-GB-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563549" comment="libreoffice-l10n-es-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563550" comment="libreoffice-l10n-fi-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563551" comment="libreoffice-l10n-fr-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563552" comment="libreoffice-l10n-gu-IN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563553" comment="libreoffice-l10n-hi-IN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563554" comment="libreoffice-l10n-hu-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563555" comment="libreoffice-l10n-it-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563556" comment="libreoffice-l10n-ja-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563557" comment="libreoffice-l10n-ko-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563558" comment="libreoffice-l10n-nb-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563559" comment="libreoffice-l10n-nl-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563560" comment="libreoffice-l10n-nn-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563561" comment="libreoffice-l10n-pl-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563563" comment="libreoffice-l10n-pt-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563564" comment="libreoffice-l10n-pt-BR-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563565" comment="libreoffice-l10n-ru-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563566" comment="libreoffice-l10n-sk-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563567" comment="libreoffice-l10n-sv-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563568" comment="libreoffice-l10n-xh-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563569" comment="libreoffice-l10n-zh-CN-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563570" comment="libreoffice-l10n-zh-TW-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563571" comment="libreoffice-l10n-zu-4.0.3.3.26-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563572" comment="libreoffice-mailmerge-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563573" comment="libreoffice-math-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563574" comment="libreoffice-mono-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563575" comment="libreoffice-officebean-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563576" comment="libreoffice-pyuno-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563578" comment="libreoffice-writer-4.0.3.3.26-0.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563579" comment="libreoffice-writer-extensions-4.0.3.3.26-0.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78405" version="1" class="patch">
	<metadata>
		<title>Security update for LibreOffice</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="382137" ref_url="https://bugzilla.suse.com/382137" source="BUGZILLA"/>
		<reference ref_id="593612" ref_url="https://bugzilla.suse.com/593612" source="BUGZILLA"/>
		<reference ref_id="654230" ref_url="https://bugzilla.suse.com/654230" source="BUGZILLA"/>
		<reference ref_id="753460" ref_url="https://bugzilla.suse.com/753460" source="BUGZILLA"/>
		<reference ref_id="757432" ref_url="https://bugzilla.suse.com/757432" source="BUGZILLA"/>
		<reference ref_id="779620" ref_url="https://bugzilla.suse.com/779620" source="BUGZILLA"/>
		<reference ref_id="779642" ref_url="https://bugzilla.suse.com/779642" source="BUGZILLA"/>
		<reference ref_id="780044" ref_url="https://bugzilla.suse.com/780044" source="BUGZILLA"/>
		<reference ref_id="783433" ref_url="https://bugzilla.suse.com/783433" source="BUGZILLA"/>
		<reference ref_id="802888" ref_url="https://bugzilla.suse.com/802888" source="BUGZILLA"/>
		<reference ref_id="816593" ref_url="https://bugzilla.suse.com/816593" source="BUGZILLA"/>
		<reference ref_id="817956" ref_url="https://bugzilla.suse.com/817956" source="BUGZILLA"/>
		<reference ref_id="819614" ref_url="https://bugzilla.suse.com/819614" source="BUGZILLA"/>
		<reference ref_id="819822" ref_url="https://bugzilla.suse.com/819822" source="BUGZILLA"/>
		<reference ref_id="819865" ref_url="https://bugzilla.suse.com/819865" source="BUGZILLA"/>
		<reference ref_id="820077" ref_url="https://bugzilla.suse.com/820077" source="BUGZILLA"/>
		<reference ref_id="820273" ref_url="https://bugzilla.suse.com/820273" source="BUGZILLA"/>
		<reference ref_id="820503" ref_url="https://bugzilla.suse.com/820503" source="BUGZILLA"/>
		<reference ref_id="820504" ref_url="https://bugzilla.suse.com/820504" source="BUGZILLA"/>
		<reference ref_id="820509" ref_url="https://bugzilla.suse.com/820509" source="BUGZILLA"/>
		<reference ref_id="820788" ref_url="https://bugzilla.suse.com/820788" source="BUGZILLA"/>
		<reference ref_id="820800" ref_url="https://bugzilla.suse.com/820800" source="BUGZILLA"/>
		<reference ref_id="820819" ref_url="https://bugzilla.suse.com/820819" source="BUGZILLA"/>
		<reference ref_id="820836" ref_url="https://bugzilla.suse.com/820836" source="BUGZILLA"/>
		<reference ref_id="821567" ref_url="https://bugzilla.suse.com/821567" source="BUGZILLA"/>
		<reference ref_id="821795" ref_url="https://bugzilla.suse.com/821795" source="BUGZILLA"/>
		<reference ref_id="822908" ref_url="https://bugzilla.suse.com/822908" source="BUGZILLA"/>
		<reference ref_id="823626" ref_url="https://bugzilla.suse.com/823626" source="BUGZILLA"/>
		<reference ref_id="823651" ref_url="https://bugzilla.suse.com/823651" source="BUGZILLA"/>
		<reference ref_id="823655" ref_url="https://bugzilla.suse.com/823655" source="BUGZILLA"/>
		<reference ref_id="823675" ref_url="https://bugzilla.suse.com/823675" source="BUGZILLA"/>
		<reference ref_id="823935" ref_url="https://bugzilla.suse.com/823935" source="BUGZILLA"/>
		<reference ref_id="825305" ref_url="https://bugzilla.suse.com/825305" source="BUGZILLA"/>
		<reference ref_id="825891" ref_url="https://bugzilla.suse.com/825891" source="BUGZILLA"/>
		<reference ref_id="825976" ref_url="https://bugzilla.suse.com/825976" source="BUGZILLA"/>
		<reference ref_id="828390" ref_url="https://bugzilla.suse.com/828390" source="BUGZILLA"/>
		<reference ref_id="828598" ref_url="https://bugzilla.suse.com/828598" source="BUGZILLA"/>
		<reference ref_id="829017" ref_url="https://bugzilla.suse.com/829017" source="BUGZILLA"/>
		<reference ref_id="830205" ref_url="https://bugzilla.suse.com/830205" source="BUGZILLA"/>
		<reference ref_id="831457" ref_url="https://bugzilla.suse.com/831457" source="BUGZILLA"/>
		<reference ref_id="831578" ref_url="https://bugzilla.suse.com/831578" source="BUGZILLA"/>
		<reference ref_id="834035" ref_url="https://bugzilla.suse.com/834035" source="BUGZILLA"/>
		<reference ref_id="834705" ref_url="https://bugzilla.suse.com/834705" source="BUGZILLA"/>
		<reference ref_id="834720" ref_url="https://bugzilla.suse.com/834720" source="BUGZILLA"/>
		<reference ref_id="834722" ref_url="https://bugzilla.suse.com/834722" source="BUGZILLA"/>
		<reference ref_id="835985" ref_url="https://bugzilla.suse.com/835985" source="BUGZILLA"/>
		<reference ref_id="837302" ref_url="https://bugzilla.suse.com/837302" source="BUGZILLA"/>
		<reference ref_id="839727" ref_url="https://bugzilla.suse.com/839727" source="BUGZILLA"/>
		<reference ref_id="862510" ref_url="https://bugzilla.suse.com/862510" source="BUGZILLA"/>
		<reference ref_id="863021" ref_url="https://bugzilla.suse.com/863021" source="BUGZILLA"/>
		<reference ref_id="864396" ref_url="https://bugzilla.suse.com/864396" source="BUGZILLA"/>
		<reference ref_id="870234" ref_url="https://bugzilla.suse.com/870234" source="BUGZILLA"/>
		<reference ref_id="878854" ref_url="https://bugzilla.suse.com/878854" source="BUGZILLA"/>
		<reference ref_id="893141" ref_url="https://bugzilla.suse.com/893141" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4156" ref_url="https://www.suse.com/security/cve/CVE-2013-4156/" source="CVE"/>
		<reference ref_id="CVE-2014-3575" ref_url="https://www.suse.com/security/cve/CVE-2014-3575/" source="CVE"/>
		<description>

LibreOffice was updated to version 4.0.3.3.26. (SUSE 4.0-patch26, tag 
suse-4.0-26, based on upstream 4.0.3.3).

Two security issues have been fixed:

    * DOCM memory corruption vulnerability. (CVE-2013-4156, bnc#831578)
    * Data exposure using crafted OLE objects. (CVE-2014-3575, bnc#893141)

The following non-security issues have been fixed:

    * chart shown flipped (bnc#834722)
    * chart missing dataset (bnc#839727)
    * import new line in text (bnc#828390)
    * lines running off screens (bnc#819614)
    * add set-all language menu (bnc#863021)
    * text rotation (bnc#783433, bnc#862510)
    * page border shadow testcase (bnc#817956)
    * one more clickable field fix (bnc#802888)
    * multilevel labels are rotated (bnc#820273)
    * incorrect nested table margins (bnc#816593)
    * use BitmapURL only if its valid (bnc#821567)
    * import gradfill for text colors (bnc#870234)
    * fix undo of paragraph attributes (bnc#828598)
    * stop-gap solution to avoid crash (bnc#830205)
    * import images with duotone filter (bnc#820077)
    * missing drop downs for autofilter (bnc#834705)
    * typos in first page style creation (bnc#820836)
    * labels wrongly interpreted as dates (bnc#834720)
    * RTF import of fFilled shape property (bnc#825305)
    * placeholders text size is not correct (bnc#831457)
    * cells value formatted with wrong output (bnc#821795)
    * RTF import of freeform shape coordinates (bnc#823655)
    * styles (rename &amp;) copy to different decks (bnc#757432)
    * XLSX Chart import with internal data table (bnc#819822)
    * handle M.d.yyyy date format in DOCX import (bnc#820509)
    * paragraph style in empty first page header (bnc#823651)
    * copying slides having same master page name (bnc#753460)
    * printing handouts using the default, 'Order' (bnc#835985)
    * wrap polygon was based on dest size of picture (bnc#820800)
    * added common flags support for SEQ field import (bnc#825976)
    * hyperlinks of illustration index in DOCX export (bnc#834035)
    * allow insertion of redlines with an empty author (bnc#837302)
    * handle drawinglayer rectangle inset in VML import (bnc#779642)
    * don't apply complex font size to non-complex font (bnc#820819)
    * issue with negative seeks in win32 shell extension (bnc#829017)
    * slide appears quite garbled when imported from PPTX (bnc#593612)
    * initial MCE support in writerfilter ooxml tokenizer (bnc#820503)
    * MSWord uses \xb for linebreaks in DB fields, take 2 (bnc#878854)
    * try harder to convert floating tables to text frames (bnc#779620)
    * itemstate in parent style incorrectly reported as set (bnc#819865)
    * default color hidden by Default style in writerfilter (bnc#820504)
    * DOCX document crashes when using internal OOXML filter (bnc#382137)
    * ugly workaround for external leading with symbol fonts (bnc#823626)
    * followup fix for exported xlsx causes errors for mso2007 (bnc#823935)
    * we only support simple labels in the InternalDataProvider
      (bnc#864396)
    * RTF import: fix import of numbering bullet associated font
      (bnc#823675)
    * page specific footer extended to every pages in DOCX export
      (bnc#654230)
    * v:textbox mso-fit-shape-to-text style property in VML import
      (bnc#820788)
    * w:spacing in a paragraph should also apply to as-char objects
      (bnc#780044)
    * compatibility setting for MS Word wrapping text in less space
      (bnc#822908)
    * fix SwWrtShell::SelAll() to work with empty table at doc start
      (bnc#825891)

Security Issues:

    * CVE-2014-3575
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3575&gt;
    * CVE-2013-4156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4156&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/382137">SUSE bug 382137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/593612">SUSE bug 593612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654230">SUSE bug 654230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753460">SUSE bug 753460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757432">SUSE bug 757432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779620">SUSE bug 779620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779642">SUSE bug 779642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780044">SUSE bug 780044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783433">SUSE bug 783433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802888">SUSE bug 802888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816593">SUSE bug 816593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817956">SUSE bug 817956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819614">SUSE bug 819614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819822">SUSE bug 819822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819865">SUSE bug 819865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820077">SUSE bug 820077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820273">SUSE bug 820273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820503">SUSE bug 820503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820504">SUSE bug 820504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820509">SUSE bug 820509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820788">SUSE bug 820788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820800">SUSE bug 820800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820819">SUSE bug 820819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820836">SUSE bug 820836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821567">SUSE bug 821567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821795">SUSE bug 821795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/822908">SUSE bug 822908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823626">SUSE bug 823626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823651">SUSE bug 823651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823655">SUSE bug 823655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823675">SUSE bug 823675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823935">SUSE bug 823935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825305">SUSE bug 825305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825891">SUSE bug 825891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825976">SUSE bug 825976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828390">SUSE bug 828390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828598">SUSE bug 828598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829017">SUSE bug 829017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830205">SUSE bug 830205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831457">SUSE bug 831457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831578">SUSE bug 831578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834035">SUSE bug 834035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834705">SUSE bug 834705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834720">SUSE bug 834720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834722">SUSE bug 834722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835985">SUSE bug 835985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/837302">SUSE bug 837302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839727">SUSE bug 839727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862510">SUSE bug 862510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863021">SUSE bug 863021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864396">SUSE bug 864396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870234">SUSE bug 870234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878854">SUSE bug 878854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/893141">SUSE bug 893141</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4156/">CVE-2013-4156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3575/">CVE-2014-3575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009563580" comment="libreoffice-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563581" comment="libreoffice-base-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563582" comment="libreoffice-base-drivers-postgresql-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563583" comment="libreoffice-base-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563585" comment="libreoffice-calc-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563586" comment="libreoffice-calc-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563587" comment="libreoffice-draw-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563588" comment="libreoffice-draw-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563589" comment="libreoffice-filters-optional-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563590" comment="libreoffice-gnome-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563591" comment="libreoffice-help-cs-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563592" comment="libreoffice-help-da-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563593" comment="libreoffice-help-de-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563594" comment="libreoffice-help-en-GB-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563595" comment="libreoffice-help-en-US-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563596" comment="libreoffice-help-es-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563597" comment="libreoffice-help-fr-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563598" comment="libreoffice-help-gu-IN-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563599" comment="libreoffice-help-hi-IN-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563600" comment="libreoffice-help-hu-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563601" comment="libreoffice-help-it-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563602" comment="libreoffice-help-ja-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563603" comment="libreoffice-help-ko-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563604" comment="libreoffice-help-nl-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563605" comment="libreoffice-help-pl-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563606" comment="libreoffice-help-pt-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563607" comment="libreoffice-help-pt-BR-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563608" comment="libreoffice-help-ru-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563609" comment="libreoffice-help-sv-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563610" comment="libreoffice-help-zh-CN-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563611" comment="libreoffice-help-zh-TW-4.0.3.3.26-0.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563612" comment="libreoffice-icon-themes-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563613" comment="libreoffice-impress-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563614" comment="libreoffice-impress-extensions-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563615" comment="libreoffice-kde-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563616" comment="libreoffice-kde4-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563617" comment="libreoffice-l10n-af-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563618" comment="libreoffice-l10n-ar-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563619" comment="libreoffice-l10n-ca-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563620" comment="libreoffice-l10n-cs-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563621" comment="libreoffice-l10n-da-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563622" comment="libreoffice-l10n-de-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563624" comment="libreoffice-l10n-en-GB-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563625" comment="libreoffice-l10n-es-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563626" comment="libreoffice-l10n-fi-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563627" comment="libreoffice-l10n-fr-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563628" comment="libreoffice-l10n-gu-IN-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563629" comment="libreoffice-l10n-hi-IN-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563630" comment="libreoffice-l10n-hu-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563631" comment="libreoffice-l10n-it-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563632" comment="libreoffice-l10n-ja-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563633" comment="libreoffice-l10n-ko-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563634" comment="libreoffice-l10n-nb-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563635" comment="libreoffice-l10n-nl-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563636" comment="libreoffice-l10n-nn-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563637" comment="libreoffice-l10n-pl-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563639" comment="libreoffice-l10n-pt-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563640" comment="libreoffice-l10n-pt-BR-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563641" comment="libreoffice-l10n-ru-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563642" comment="libreoffice-l10n-sk-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563643" comment="libreoffice-l10n-sv-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563644" comment="libreoffice-l10n-xh-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563645" comment="libreoffice-l10n-zh-CN-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563646" comment="libreoffice-l10n-zh-TW-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563647" comment="libreoffice-l10n-zu-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563648" comment="libreoffice-mailmerge-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563649" comment="libreoffice-math-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563650" comment="libreoffice-mono-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563651" comment="libreoffice-officebean-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563652" comment="libreoffice-pyuno-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563654" comment="libreoffice-writer-4.0.3.3.26-0.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563655" comment="libreoffice-writer-extensions-4.0.3.3.26-0.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78406" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566909" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566910" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566911" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78407" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="911796" ref_url="https://bugzilla.suse.com/911796" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<description>

This update for libsndfile fixes two buffer read overflows in 
sd2_parse_rsrc_fork(). (CVE-2014-9496, bsc#911796)

Security Issues:

    * CVE-2014-9496
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-01-23"/>
	<updated date="2015-01-23"/>
	<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566912" comment="libsndfile-1.0.20-2.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566913" comment="libsndfile-32bit-1.0.20-2.6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78408" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566914" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566915" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78409" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="865222" ref_url="https://bugzilla.suse.com/865222" source="BUGZILLA"/>
		<reference ref_id="894361" ref_url="https://bugzilla.suse.com/894361" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565/" source="CVE"/>
		<description>

This update for net-snmp fixes a remote denial of service problem inside 
snmptrapd when it is started with the '-OQ' option. (CVE-2014-3565, 
bnc#894361)

Additionally, a timeout issue during SNMP MIB walk on OID 1.3.6.1.2.1.4.24 
when using newer (v5.5+) versions of snmpwalk has been fixed. (bnc#865222)

Security Issues:

    * CVE-2014-3565
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-02"/>
	<updated date="2014-09-02"/>
	<bugzilla href="https://bugzilla.suse.com/865222">SUSE bug 865222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566916" comment="libsnmp15-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563659" comment="libsnmp15-32bit-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566917" comment="net-snmp-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566918" comment="perl-SNMP-5.4.2.1-8.12.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566919" comment="snmp-mibs-5.4.2.1-8.12.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78410" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="866278" ref_url="https://bugzilla.suse.com/866278" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0017" ref_url="https://www.suse.com/security/cve/CVE-2014-0017/" source="CVE"/>
		<description>

This update of libssh fixes the following security issue:

    * When libssh operates in server mode, the randomness pool was not
      switched on fork, so two pools could operate on the same randomness
      and could generate the same keys.

Security Issue references:

    * CVE-2014-0017
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-07"/>
	<updated date="2014-03-07"/>
	<bugzilla href="https://bugzilla.suse.com/866278">SUSE bug 866278</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0017/">CVE-2014-0017</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566920" comment="libssh2-0.2-5.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78411" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="921070" ref_url="https://bugzilla.suse.com/921070" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001334.html" source="SUSE-SU"/>
		<description>

The ssh client library libssh2_org was updated to fix a security issue:

    * CVE-2015-1782: A malicious server could send a crafted
      SSH_MSG_KEXINIT packet, that could lead to a buffer overread and to a
      crash of the application using libssh2_org.

Security Issues:

    * CVE-2015-1782
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-09"/>
	<updated date="2015-03-09"/>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563663" comment="libssh2-1-1.2.9-4.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78412" version="1" class="patch">
	<metadata>
		<title>Security update for libtasn1</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="880735" ref_url="https://bugzilla.suse.com/880735" source="BUGZILLA"/>
		<reference ref_id="880737" ref_url="https://bugzilla.suse.com/880737" source="BUGZILLA"/>
		<reference ref_id="880738" ref_url="https://bugzilla.suse.com/880738" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467/" source="CVE"/>
		<reference ref_id="CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468/" source="CVE"/>
		<reference ref_id="CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001393.html" source="SUSE-SU"/>
		<description>

libtasn1 has been updated to fix three security issues:

    * asn1_get_bit_der() could have returned negative bit length
      (CVE-2014-3468)
    * Multiple boundary check issues could have allowed DoS (CVE-2014-3467)
    * Possible DoS by NULL pointer dereference in asn1_read_value_type
      (CVE-2014-3469)

Security Issues:

    * CVE-2014-3468
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468&gt;
    * CVE-2014-3467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467&gt;
    * CVE-2014-3469
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-17"/>
	<updated date="2014-07-17"/>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566921" comment="libtasn1-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566922" comment="libtasn1-3-1.5-1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566923" comment="libtasn1-3-32bit-1.5-1.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78413" version="1" class="patch">
	<metadata>
		<title>Security update for libtiff</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="834477" ref_url="https://bugzilla.suse.com/834477" source="BUGZILLA"/>
		<reference ref_id="834779" ref_url="https://bugzilla.suse.com/834779" source="BUGZILLA"/>
		<reference ref_id="834788" ref_url="https://bugzilla.suse.com/834788" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<description>

This tiff update fixes several security issues.

    * bnc#834477: CVE-2013-4232 CVE-2013-4231: tiff: buffer overflows/use
      after free problem
    * bnc#834779: CVE-2013-4243: libtiff (gif2tiff): heap-based buffer
      overflow in readgifimage()
    * bnc#834788: CVE-2013-4244: libtiff (gif2tiff): OOB Write in LZW
      decompressor

Security Issue references:

    * CVE-2013-4232
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232&gt;
    * CVE-2013-4231
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231&gt;
    * CVE-2013-4243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243&gt;
    * CVE-2013-4244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566131" comment="libtiff3-3.8.2-141.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566132" comment="libtiff3-32bit-3.8.2-141.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78414" version="1" class="patch">
	<metadata>
		<title>Security update for libvdpau (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="943967" ref_url="https://bugzilla.suse.com/943967" source="BUGZILLA"/>
		<reference ref_id="943968" ref_url="https://bugzilla.suse.com/943968" source="BUGZILLA"/>
		<reference ref_id="943969" ref_url="https://bugzilla.suse.com/943969" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<description>

libvdpau was updated to use secure_getenv() instead of getenv() for several variables
so it can be more safely used in setuid applications.

* CVE-2015-5198: libvdpau: incorrect check for security transition (bnc#943967)
* CVE-2015-5199: libvdpau: directory traversal in dlopen (bnc#943968)
* CVE-2015-5200: libvdpau: vulnerability in trace functionality (bnc#943969)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-08"/>
	<updated date="2015-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/943967">SUSE bug 943967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943968">SUSE bug 943968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943969">SUSE bug 943969</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566924" comment="libvdpau1-0.4.1-16.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566925" comment="libvdpau1-32bit-0.4.1-16.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78415" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="857490" ref_url="https://bugzilla.suse.com/857490" source="BUGZILLA"/>
		<reference ref_id="873705" ref_url="https://bugzilla.suse.com/873705" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6456" ref_url="https://www.suse.com/security/cve/CVE-2013-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179/" source="CVE"/>
		<description>

libvirt has been patched to fix two security issues.

Further information is available at
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179
&lt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0179&gt; and
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456
&lt;http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6456&gt;

These security issues have been fixed:

    * Unsafe parsing of XML documents allows arbitrary file read or denial
      of service (CVE-2014-0179)
    * Ability to delete or create arbitrary host devices (CVE-2013-6456)

Security Issue references:

    * CVE-2014-0179
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179&gt;
    * CVE-2013-6456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-07"/>
	<updated date="2014-05-07"/>
	<bugzilla href="https://bugzilla.suse.com/857490">SUSE bug 857490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6456/">CVE-2013-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566926" comment="libvirt-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566927" comment="libvirt-client-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566928" comment="libvirt-client-32bit-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566929" comment="libvirt-doc-1.0.5.9-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566930" comment="libvirt-python-1.0.5.9-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78416" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566931" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78417" version="1" class="patch">
	<metadata>
		<title>Security update for libwmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="831299" ref_url="https://bugzilla.suse.com/831299" source="BUGZILLA"/>
		<reference ref_id="933109" ref_url="https://bugzilla.suse.com/933109" source="BUGZILLA"/>
		<reference ref_id="936058" ref_url="https://bugzilla.suse.com/936058" source="BUGZILLA"/>
		<reference ref_id="936062" ref_url="https://bugzilla.suse.com/936062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<description>
libwmf was updated to fix four security issues.

These security issues were fixed:
- CVE-2015-4588: Heap-based buffer overflow in the DecodeImage function allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted 'run-length count' in an image in a WMF file (bsc#933109).
- CVE-2015-0848: Heap-based buffer overflow allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image (bsc#933109).
- CVE-2015-4696: Use-after-free vulnerability allowed remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command (bsc#936062).
- CVE-2015-4695: meta.h allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file (bsc#936058).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/831299">SUSE bug 831299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936058">SUSE bug 936058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936062">SUSE bug 936062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566932" comment="libwmf-0.2.8.4-206.29.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78418" version="1" class="patch">
	<metadata>
		<title>Security update for openwsman</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="901882" ref_url="https://bugzilla.suse.com/901882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<description>

This update adds a configuration option to disable SSLv2 and SSLv3 in 
openwsman. This is required to mitigate CVE-2014-3566.

To use the new option, edit /etc/openwsman/openwsman.conf and add the 
following line to the [server] section:

ssl_disabled_protocols = SSLv2 SSLv3

Security Issues:

    * CVE-2014-3566
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/901882">SUSE bug 901882</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566933" comment="libwsman1-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566934" comment="openwsman-client-2.2.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566935" comment="openwsman-server-2.2.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78419" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="901546" ref_url="https://bugzilla.suse.com/901546" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<description>

This update fixes a denial of service via recursive entity expansion. 
(CVE-2014-3660)

Security Issues:

    * CVE-2014-3660
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-20"/>
	<updated date="2014-10-20"/>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566936" comment="libxml2-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566937" comment="libxml2-32bit-2.7.6-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566938" comment="libxml2-python-2.7.6-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78420" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78421" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566942" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566943" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566944" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78422" version="1" class="patch">
	<metadata>
		<title>Security update for libxslt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="849019" ref_url="https://bugzilla.suse.com/849019" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-3970" ref_url="https://www.suse.com/security/cve/CVE-2011-3970/" source="CVE"/>
		<reference ref_id="CVE-2012-2825" ref_url="https://www.suse.com/security/cve/CVE-2012-2825/" source="CVE"/>
		<reference ref_id="CVE-2012-6139" ref_url="https://www.suse.com/security/cve/CVE-2012-6139/" source="CVE"/>
		<description>

libxslt received a security update to fix a security issue:

    * CVE-2013-4520: The XSL implementation in libxslt allowed remote
      attackers to cause a denial of service (crash) via an invalid DTD.
      (addendum due to incomplete fix for CVE-2012-2825)

Security Issue references:

    * CVE-2012-6139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139&gt;
    * CVE-2012-2825
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825&gt;
    * CVE-2011-3970
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-06"/>
	<updated date="2013-11-06"/>
	<bugzilla href="https://bugzilla.suse.com/849019">SUSE bug 849019</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3970/">CVE-2011-3970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2825/">CVE-2012-2825</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6139/">CVE-2012-6139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566146" comment="libxslt-1.1.24-19.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566147" comment="libxslt-32bit-1.1.24-19.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78423" version="1" class="patch">
	<metadata>
		<title>Security update for lxc</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="839653" ref_url="https://bugzilla.suse.com/839653" source="BUGZILLA"/>
		<reference ref_id="839663" ref_url="https://bugzilla.suse.com/839663" source="BUGZILLA"/>
		<reference ref_id="855809" ref_url="https://bugzilla.suse.com/855809" source="BUGZILLA"/>
		<reference ref_id="869663" ref_url="https://bugzilla.suse.com/869663" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6441" ref_url="https://www.suse.com/security/cve/CVE-2013-6441/" source="CVE"/>
		<description>

The container framework LXC has been updated to fix various bugs and a 
security issue:

    * CVE-2013-6441: The sshd template allowed privilege escalation on the
      host.
    * SLES container time not aligned with host time (bnc#839653)
    * SLES container boot takes ages (bnc#839663)
    * lxc mounts /dev/pts with wrong options (bnc#869663)

Security Issues:

    * CVE-2013-6441
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6441&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/839653">SUSE bug 839653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839663">SUSE bug 839663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855809">SUSE bug 855809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869663">SUSE bug 869663</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-6441/">CVE-2013-6441</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563694" comment="lxc-0.8.0-0.21.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78424" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="946744" ref_url="https://bugzilla.suse.com/946744" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<description>
lxc was update to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563696" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78425" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566945" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566946" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566947" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566948" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566949" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566950" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566951" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566952" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566953" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566954" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78426" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566955" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566956" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78427" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

   - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566957" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566958" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566959" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566960" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566961" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566962" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566963" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78428" version="1" class="patch">
	<metadata>
		<title>Security update for Mozilla NSS</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="847708" ref_url="https://bugzilla.suse.com/847708" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739/" source="CVE"/>
		<description>

Mozilla NSS has been updated to 3.15.2 (bnc#847708) bringing various 
features and bugfixes:

The main feature is TLS 1.2 support and its dependent algorithms.

    * Support for AES-GCM ciphersuites that use the SHA-256 PRF
    * MD2, MD4, and MD5 signatures are no longer accepted for OCSP or CRLs
    * Add PK11_CipherFinal macro
    * sizeof() used incorrectly
    * nssutil_ReadSecmodDB() leaks memory
    * Allow SSL_HandshakeNegotiatedExtension to be called before the
      handshake is finished.
    * Deprecate the SSL cipher policy code
    * Avoid uninitialized data read in the event of a decryption failure.
      (CVE-2013-1739)

Changes coming with version 3.15.1:

    * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites (RFC 5246
      and RFC 5289) are supported, allowing TLS to be used without MD5 and
      SHA-1.
      Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF, which is
      always SHA-256 in NSS 3.15.1. AES GCM cipher suites are not yet
      supported.
          o some bugfixes and improvements

Changes with version 3.15

    * New Functionality
          o Support for OCSP Stapling (RFC 6066, Certificate Status
            Request) has been added for both client and server sockets. TLS
            client applications may enable this via a call to
            SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
          o Added function SECITEM_ReallocItemV2. It replaces function
            SECITEM_ReallocItem, which is now declared as obsolete.
          o Support for single-operation (eg: not multi-part) symmetric key
            encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
          o certutil has been updated to support creating name constraints
            extensions.

Security Issue reference:

    * CVE-2013-1739
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-30"/>
	<updated date="2013-10-30"/>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566964" comment="libfreebl3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566965" comment="libfreebl3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566966" comment="libsoftokn3-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566967" comment="libsoftokn3-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566150" comment="mozilla-nspr-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566151" comment="mozilla-nspr-32bit-4.10.1-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566968" comment="mozilla-nss-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566969" comment="mozilla-nss-32bit-3.15.2-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566970" comment="mozilla-nss-tools-3.15.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78429" version="1" class="patch">
	<metadata>
		<title>Security update for mutt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="868115" ref_url="https://bugzilla.suse.com/868115" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001359.html" source="SUSE-SU"/>
		<description>

The mailreader mutt was updated to fix a security issue in displaying mail 
headers, where a crafted e-mail could cause a heap overflow, which in turn 
might be used by attackers to crash mutt or potentially even execute code.

Security Issues references:

    * CVE-2014-0467
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-17"/>
	<updated date="2014-03-17"/>
	<bugzilla href="https://bugzilla.suse.com/868115">SUSE bug 868115</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566971" comment="mutt-1.5.17-42.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78430" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="928962" ref_url="https://bugzilla.suse.com/928962" source="BUGZILLA"/>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="938412" ref_url="https://bugzilla.suse.com/938412" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<description>

MySQL was updated to version 5.5.45, fixing bugs and security issues.

A list of all changes can be found on:

- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html

To fix the 'BACKRONYM' security issue (CVE-2015-3152) the behaviour of 
the SSL options was changed slightly to meet expectations:
Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl
connection is required. The mysql client will now print an error
if ssl is required, but the server can not handle a ssl
connection [bnc#924663], [bnc#928962], [CVE-2015-3152]

Additional bugs fixed:
- fix rc.mysql-multi script to start instances after restart
  properly [bnc#934401].
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78431" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="951391" ref_url="https://bugzilla.suse.com/951391" source="BUGZILLA"/>
		<reference ref_id="952196" ref_url="https://bugzilla.suse.com/952196" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<description>
The mysql package was updated to version 5.5.46 to fixs several security and non security issues.

- bnc#951391: update to version 5.5.46
  * changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
  * fixed CVEs:
    CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
    CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
    CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
    CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
    CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
    CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
    CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
    CVE-2015-4913
- bnc#952196: Fixed a build error for ppc*, s390* and ia64 architectures.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952196">SUSE bug 952196</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78432" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="962779" ref_url="https://bugzilla.suse.com/962779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<description>

This update to MySQL 5.5.47 fixes the following issues (bsc#962779):

- CVE-2015-7744: Lack of verification against faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
- CVE-2016-0502: Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Options. 
- CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. 
- CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. 
- CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect integrity via unknown vectors related to encryption. 
- CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to UDF. 
- CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to privileges. 
- CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
- bsc#959724: Possible buffer overflow from incorrect use of strcpy() and sprintf()
    
The following bugs were fixed:
    
- bsc#960961: Incorrect use of plugin-load option in default_plugins.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78433" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566990" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563731" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566991" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566992" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566993" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78434" version="1" class="patch">
	<metadata>
		<title>Security update for novell-qtgui, novell-ui-base</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="872796" ref_url="https://bugzilla.suse.com/872796" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0595" ref_url="https://www.suse.com/security/cve/CVE-2014-0595/" source="CVE"/>
		<description>

Packages novell-ui-base and novell-qtgui were updated to prevent erroneous 
rights assignment when a user is granted 'File Scan' rights (F). In this 
case nwrights was assigning Supervisor (S) rights. (CVE-2014-0595)

Further information is available at 
https://bugzilla.novell.com/show_bug.cgi?id=872796
&lt;https://bugzilla.novell.com/show_bug.cgi?id=872796&gt; .

Security Issue reference:

    * CVE-2014-0595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0595&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-19"/>
	<updated date="2014-05-19"/>
	<bugzilla href="https://bugzilla.suse.com/872796">SUSE bug 872796</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0595/">CVE-2014-0595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566994" comment="novell-qtgui-3.0.0-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566995" comment="novell-qtgui-cli-3.0.0-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566996" comment="novell-ui-base-3.0.0-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78435" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="850148" ref_url="https://bugzilla.suse.com/850148" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1741" ref_url="https://www.suse.com/security/cve/CVE-2013-1741/" source="CVE"/>
		<reference ref_id="CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605/" source="CVE"/>
		<reference ref_id="CVE-2013-5606" ref_url="https://www.suse.com/security/cve/CVE-2013-5606/" source="CVE"/>
		<reference ref_id="CVE-2013-5607" ref_url="https://www.suse.com/security/cve/CVE-2013-5607/" source="CVE"/>
		<description>

Mozilla NSPR and NSS were updated to fix various security bugs that could 
be used to crash the browser or potentially execute code.

Mozilla NSPR 4.10.2 has the following bug fixes:

    * Bug 770534: Possible pointer overflow in PL_ArenaAllocate(). Fixed by
      Pascal Cuoq and Kamil Dudka.
    * Bug 888546: ptio.c:PR_ImportUDPSocket doesn't work. Fixed by Miloslav
      Trmac.
    * Bug 915522: VS2013 support for NSPR. Fixed by Makoto Kato.
    * Bug 927687: Avoid unsigned integer wrapping in PL_ArenaAllocate.
      (CVE-2013-5607)

Mozilla NSS 3.15.3 is a patch release for NSS 3.15 and includes the 
following bug fixes:

    * Bug 925100: Ensure a size is &lt;= half of the maximum PRUint32 value.
      (CVE-2013-1741)
    * Bug 934016: Handle invalid handshake packets. (CVE-2013-5605)
    * Bug 910438: Return the correct result in CERT_VerifyCert on failure,
      if a verifyLog isn't used. (CVE-2013-5606)

Security Issue references:

    * CVE-2013-1741
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741&gt;
    * CVE-2013-5605
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605&gt;
    * CVE-2013-5606
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606&gt;
    * CVE-2013-5607
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-21"/>
	<updated date="2013-11-21"/>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1741/">CVE-2013-1741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5606/">CVE-2013-5606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5607/">CVE-2013-5607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566997" comment="libfreebl3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566998" comment="libfreebl3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566999" comment="libsoftokn3-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567000" comment="libsoftokn3-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566157" comment="mozilla-nspr-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566158" comment="mozilla-nspr-32bit-4.10.2-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567001" comment="mozilla-nss-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567002" comment="mozilla-nss-32bit-3.15.3-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567003" comment="mozilla-nss-tools-3.15.3-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78436" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567004" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567005" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567006" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78437" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="846389" ref_url="https://bugzilla.suse.com/846389" source="BUGZILLA"/>
		<reference ref_id="905959" ref_url="https://bugzilla.suse.com/905959" source="BUGZILLA"/>
		<reference ref_id="916897" ref_url="https://bugzilla.suse.com/916897" source="BUGZILLA"/>
		<reference ref_id="916914" ref_url="https://bugzilla.suse.com/916914" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4449" ref_url="https://www.suse.com/security/cve/CVE-2013-4449/" source="CVE"/>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<description>

openldap2 was updated to fix three security issues and one non-security 
bug.

The following vulnerabilities were fixed:

    * A remote attacker could cause a denial of service (slapd crash) by
      unbinding immediately after a search request. (bnc#846389,
      CVE-2013-4449)
    * A remote attacker could cause a denial of service through a NULL
      pointer dereference and crash via an empty attribute list in a deref
      control in a search request. (bnc#916897, CVE-2015-1545)
    * A remote attacker could cause a denial of service (crash) via a
      crafted search query with a matched values control. (bnc#916914,
      CVE-2015-1546)

The following non-security bug was fixed:

    * Prevent connection-0 (internal connection) from showing up in the
      monitor back-end. (bnc#905959)

Security Issues:

    * CVE-2015-1546
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546&gt;
    * CVE-2015-1545
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545&gt;
    * CVE-2013-4449
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4449&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-04-13"/>
	<updated date="2015-04-13"/>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905959">SUSE bug 905959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4449/">CVE-2013-4449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567007" comment="libldap-2_4-2-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567008" comment="libldap-2_4-2-32bit-2.4.26-0.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567009" comment="openldap2-client-2.4.26-0.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78438" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567010" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567011" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567012" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78439" version="1" class="patch">
	<metadata>
		<title>Security update for OpenSLP</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="778508" ref_url="https://bugzilla.suse.com/778508" source="BUGZILLA"/>
		<reference ref_id="855385" ref_url="https://bugzilla.suse.com/855385" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-4428" ref_url="https://www.suse.com/security/cve/CVE-2012-4428/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001397.html" source="SUSE-SU"/>
		<description>

This update for OpenSLP fixes a bug in SLPIntersectStringList that could 
lead to an out-of-bounds read (CVE-2012-4428). Additionally, the SLP daemon 
now always use localtime(3) when writing to log files to avoid having 
timestamps with different timezones.

Security Issues:

    * CVE-2012-4428
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4428&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-06"/>
	<updated date="2015-05-06"/>
	<bugzilla href="https://bugzilla.suse.com/778508">SUSE bug 778508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855385">SUSE bug 855385</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2012-4428/">CVE-2012-4428</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567013" comment="openslp-1.2.0-172.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567014" comment="openslp-32bit-1.2.0-172.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78440" version="1" class="patch">
	<metadata>
		<title>Security update for openssh</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="826427" ref_url="https://bugzilla.suse.com/826427" source="BUGZILLA"/>
		<reference ref_id="833605" ref_url="https://bugzilla.suse.com/833605" source="BUGZILLA"/>
		<reference ref_id="847710" ref_url="https://bugzilla.suse.com/847710" source="BUGZILLA"/>
		<reference ref_id="869101" ref_url="https://bugzilla.suse.com/869101" source="BUGZILLA"/>
		<reference ref_id="870532" ref_url="https://bugzilla.suse.com/870532" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532/" source="CVE"/>
		<description>

This update for OpenSSH fixes the following issues:

    * Exit sshd normally when port is already in use. (bnc#832628)
    * Use hardware crypto engines where available. (bnc#826427)
    * Use correct options for login when it is used. (bnc#833605)
    * Move FIPS messages to higher debug level. (bnc#862875)
    * Fix forwarding with IPv6 addresses in DISPLAY. (bnc#847710)
    * Do not link OpenSSH binaries with LDAP libraries. (bnc#826906)
    * Parse AcceptEnv properly. (bnc#869101, CVE-2014-2532)
    * Check SSHFP DNS records even for server certificates. (bnc#870532,
      CVE-2014-2653)

Security Issues references:

    * CVE-2014-2532
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532&gt;
    * CVE-2014-2653
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-07"/>
	<updated date="2014-06-07"/>
	<bugzilla href="https://bugzilla.suse.com/826427">SUSE bug 826427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833605">SUSE bug 833605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847710">SUSE bug 847710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869101">SUSE bug 869101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870532">SUSE bug 870532</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567015" comment="openssh-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567016" comment="openssh-askpass-6.2p2-0.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567017" comment="openssh-askpass-gnome-6.2p2-0.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78441" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="673532" ref_url="https://bugzilla.suse.com/673532" source="BUGZILLA"/>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="905118" ref_url="https://bugzilla.suse.com/905118" source="BUGZILLA"/>
		<reference ref_id="914309" ref_url="https://bugzilla.suse.com/914309" source="BUGZILLA"/>
		<reference ref_id="916549" ref_url="https://bugzilla.suse.com/916549" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="943006" ref_url="https://bugzilla.suse.com/943006" source="BUGZILLA"/>
		<reference ref_id="943010" ref_url="https://bugzilla.suse.com/943010" source="BUGZILLA"/>
		<reference ref_id="945493" ref_url="https://bugzilla.suse.com/945493" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<description>
openssh was updated to fix several security issues and bugs.

These security issues were fixed:
* CVE-2015-5352: The x11_open_helper function in channels.c in ssh
  in OpenSSH when ForwardX11Trusted mode is not used, lacked a check of
  the refusal deadline for X connections, which made it easier for remote
  attackers to bypass intended access restrictions via a connection outside
  of the permitted time window (bsc#936695).
* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
  in sshd in OpenSSH did not properly restrict the processing of
  keyboard-interactive devices within a single connection, which made it
  easier for remote attackers to conduct brute-force attacks or cause a
  denial of service (CPU consumption) via a long and duplicative list in
  the ssh -oKbdInteractiveDevices option, as demonstrated by a modified
  client that provides a different password for each pam element on this
  list (bsc#938746).
* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM (bsc#932483).
* Hardening patch to fix sftp RCE (bsc#903649).
* CVE-2015-6563: The monitor component in sshd in OpenSSH accepted
  extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which
  allowed local users to conduct impersonation attacks by leveraging any SSH
  login access in conjunction with control of the sshd uid to send a crafted
  MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
* CVE-2015-6564: Use-after-free vulnerability in the
  mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH might
  have allowed local users to gain privileges by leveraging control of the
  sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.

These non-security issues were fixed:
- bsc#914309: sshd inherits oom_adj -17 on SIGHUP causing DoS potential for oom_killer.
- bsc#673532: limits.conf fsize change in SLES10SP3 causing problems to WebSphere mqm user.
- bsc#916549: Fixed support for aesXXX-gcm@openssh.com.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-17"/>
	<updated date="2015-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/673532">SUSE bug 673532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905118">SUSE bug 905118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914309">SUSE bug 914309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916549">SUSE bug 916549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945493">SUSE bug 945493</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567018" comment="openssh-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567019" comment="openssh-askpass-6.2p2-0.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567020" comment="openssh-askpass-gnome-6.2p2-0.21.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78442" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567021" comment="openssh-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567022" comment="openssh-askpass-6.2p2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567023" comment="openssh-askpass-gnome-6.2p2-0.24.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78443" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567024" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567025" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567026" comment="openssl-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78444" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-certs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="875647" ref_url="https://bugzilla.suse.com/875647" source="BUGZILLA"/>
		<reference ref_id="881241" ref_url="https://bugzilla.suse.com/881241" source="BUGZILLA"/>
		<description>

openssl-certs has been updated to include four new and remove two 
certificates:

    * new: Atos_TrustedRoot_2011:2.8.92.51.203.98.44.95.179.50.crt
    * new:
      E-Tugra_Certification_Authority:2.8.106.104.62.156.81.155.203.83.crt
    * new:
      TeliaSonera_Root_CA_v1:2.17.0.149.190.22.160.247.46.70.241.123.57.130.114.250.139.205.150.crt
    * new: T-TeleSec_GlobalRoot_Class_2:2.1.1.crt
    * removed: Firmaprofesional_Root_CA:2.1.1.crt
    * removed: TDC_OCES_Root_CA:2.4.62.72.189.196.crt

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-04"/>
	<updated date="2014-06-04"/>
	<bugzilla href="https://bugzilla.suse.com/875647">SUSE bug 875647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881241">SUSE bug 881241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567027" comment="openssl-certs-1.97-0.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78445" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843509" ref_url="https://bugzilla.suse.com/843509" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2061" ref_url="https://www.suse.com/security/cve/CVE-2013-2061/" source="CVE"/>
		<description>

OpenVPN used a non-constant-time memcmp in HMAC comparison in 
openvpn_decrypt that might have allowed remote attackers to gain knowledge 
of plaintext data. (CVE-2013-2061)

Security Issues:

    * CVE-2013-2061
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2061&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-01"/>
	<updated date="2013-11-01"/>
	<bugzilla href="https://bugzilla.suse.com/843509">SUSE bug 843509</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2061/">CVE-2013-2061</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567028" comment="openvpn-2.0.9-143.40.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78446" version="1" class="patch">
	<metadata>
		<title>Security update for orca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="916835" ref_url="https://bugzilla.suse.com/916835" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001710.html" source="SUSE-SU"/>
		<description>
This orca update fixes the following security issue.

- Don't try to import modules from current working directory (bsc#916835, CVE-2013-4245).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567029" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567030" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78447" version="1" class="patch">
	<metadata>
		<title>Security update for pam</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="848417" ref_url="https://bugzilla.suse.com/848417" source="BUGZILLA"/>
		<reference ref_id="870433" ref_url="https://bugzilla.suse.com/870433" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583/" source="CVE"/>
		<description>

This update changes the broken default behavior of pam_pwhistory to not 
enforce checks when the root user requests password changes. In order to 
enforce pwhistory checks on the root user, the 'enforce_for_root' parameter 
needs to be set for the pam_pwhistory.so module.

This pam update fixes the following security and non-security issues:

    * bnc#870433: Fixed pam_timestamp path injection problem
      (CVE-2014-2583)
    * bnc#848417: Fixed pam_pwhistory root password enforcement when
      resetting non-root user's password

Security Issue references:

    * CVE-2014-2583
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-11"/>
	<updated date="2014-04-11"/>
	<bugzilla href="https://bugzilla.suse.com/848417">SUSE bug 848417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870433">SUSE bug 870433</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567031" comment="pam-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567032" comment="pam-32bit-1.1.5-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567033" comment="pam-doc-1.1.5-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78448" version="1" class="patch">
	<metadata>
		<title>Security update for perl</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="838333" ref_url="https://bugzilla.suse.com/838333" source="BUGZILLA"/>
		<reference ref_id="896715" ref_url="https://bugzilla.suse.com/896715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4330" ref_url="https://www.suse.com/security/cve/CVE-2014-4330/" source="CVE"/>
		<description>

This update fixes a memory leak and an infinite recursion in Data::Dumper. 
(CVE-2014-4330)

Security Issues:

    * CVE-2014-4330
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-22"/>
	<updated date="2014-10-22"/>
	<bugzilla href="https://bugzilla.suse.com/838333">SUSE bug 838333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896715">SUSE bug 896715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4330/">CVE-2014-4330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567034" comment="perl-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567035" comment="perl-32bit-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567036" comment="perl-Module-Build-0.2808.01-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567037" comment="perl-Test-Simple-0.72-0.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567038" comment="perl-base-5.10.0-64.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567039" comment="perl-doc-5.10.0-64.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78449" version="1" class="patch">
	<metadata>
		<title>Security update for popt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="892431" ref_url="https://bugzilla.suse.com/892431" source="BUGZILLA"/>
		<reference ref_id="906803" ref_url="https://bugzilla.suse.com/906803" source="BUGZILLA"/>
		<reference ref_id="908128" ref_url="https://bugzilla.suse.com/908128" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435/" source="CVE"/>
		<reference ref_id="CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118/" source="CVE"/>
		<description>

This rpm update fixes the following security and non security issues.

    * bnc#908128: check for bad invalid name sizes (CVE-2014-8118)
    * bnc#906803: create files with mode 0 (CVE-2013-6435)
    * bnc#892431: honor --noglob in install mode

Security Issues:

    * CVE-2014-8118
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118&gt;
    * CVE-2013-6435
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-12-15"/>
	<updated date="2014-12-15"/>
	<bugzilla href="https://bugzilla.suse.com/892431">SUSE bug 892431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567040" comment="popt-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567041" comment="popt-32bit-1.7-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567042" comment="rpm-4.4.2.3-37.60.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567043" comment="rpm-32bit-4.4.2.3-37.60.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78450" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567044" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567045" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567046" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567047" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567048" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78451" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="916953" ref_url="https://bugzilla.suse.com/916953" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8161" ref_url="https://www.suse.com/security/cve/CVE-2014-8161/" source="CVE"/>
		<reference ref_id="CVE-2015-0241" ref_url="https://www.suse.com/security/cve/CVE-2015-0241/" source="CVE"/>
		<reference ref_id="CVE-2015-0243" ref_url="https://www.suse.com/security/cve/CVE-2015-0243/" source="CVE"/>
		<reference ref_id="CVE-2015-0244" ref_url="https://www.suse.com/security/cve/CVE-2015-0244/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001321.html" source="SUSE-SU"/>
		<description>

The PostgreSQL database server was updated to 9.1.15, fixing bugs and 
security issues:

    * Fix buffer overruns in to_char() (CVE-2015-0241).
    * Fix buffer overrun in replacement *printf() functions
      (CVE-2015-0242).
    * Fix buffer overruns in contrib/pgcrypto (CVE-2015-0243).
    * Fix possible loss of frontend/backend protocol synchronization after
      an error (CVE-2015-0244).
    * Fix information leak via constraint-violation error messages
      (CVE-2014-8161).

For a comprehensive list of fixes, please refer to the following release 
notes:

    * http://www.postgresql.org/docs/9.1/static/release-9-1-15.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-15.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-14.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-14.html&gt;
    * http://www.postgresql.org/docs/9.1/static/release-9-1-13.html
      &lt;http://www.postgresql.org/docs/9.1/static/release-9-1-13.html&gt;

Security Issues:

    * CVE-2015-0241
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241&gt;
    * CVE-2015-0243
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243&gt;
    * CVE-2015-0244
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244&gt;
    * CVE-2014-8161
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-02"/>
	<updated date="2015-03-02"/>
	<bugzilla href="https://bugzilla.suse.com/916953">SUSE bug 916953</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8161/">CVE-2014-8161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0241/">CVE-2015-0241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0243/">CVE-2015-0243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0244/">CVE-2015-0244</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567049" comment="libecpg6-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567050" comment="libpq5-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567051" comment="libpq5-32bit-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567052" comment="postgresql91-9.1.15-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567053" comment="postgresql91-docs-9.1.15-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78452" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="907651" ref_url="https://bugzilla.suse.com/907651" source="BUGZILLA"/>
		<reference ref_id="931972" ref_url="https://bugzilla.suse.com/931972" source="BUGZILLA"/>
		<reference ref_id="931973" ref_url="https://bugzilla.suse.com/931973" source="BUGZILLA"/>
		<reference ref_id="931974" ref_url="https://bugzilla.suse.com/931974" source="BUGZILLA"/>
		<reference ref_id="932040" ref_url="https://bugzilla.suse.com/932040" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165/" source="CVE"/>
		<reference ref_id="CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166/" source="CVE"/>
		<reference ref_id="CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<description>

This update provides PostgreSQL 9.1.18, which brings fixes for security 
issues and other enhancements.

The following vulnerabilities have been fixed:

    * CVE-2015-3165: Avoid possible crash when client disconnects.
      (bsc#931972)
    * CVE-2015-3166: Consistently check for failure of the *printf().
      (bsc#931973)
    * CVE-2015-3167: In contrib/pgcrypto, uniformly report decryption
      failures. (bsc#931974)

For a comprehensive list of changes, please refer to 
http://www.postgresql.org/docs/9.1/static/release-9-1-18.html
&lt;http://www.postgresql.org/docs/9.1/static/release-9-1-18.html&gt; .

This update also includes changes in PostgreSQL's packaging to prepare for 
the migration to the new major version 9.4. (FATE#316970, bsc#907651)

Security Issues:

    * CVE-2015-3165
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165&gt;
    * CVE-2015-3166
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166&gt;
    * CVE-2015-3167
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-11"/>
	<updated date="2015-06-11"/>
	<bugzilla href="https://bugzilla.suse.com/907651">SUSE bug 907651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567054" comment="postgresql91-9.1.18-0.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567055" comment="postgresql91-docs-9.1.18-0.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78453" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql91 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001862.html" source="SUSE-SU"/>
		<description>

This update of postgresql91 to 9.1.19 fixes the following issues:

* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.1.19 release:
http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-09"/>
	<updated date="2016-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567056" comment="postgresql91-9.1.19-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567057" comment="postgresql91-docs-9.1.19-0.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78454" version="1" class="patch">
	<metadata>
		<title>Security update for ppp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="891489" ref_url="https://bugzilla.suse.com/891489" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<description>

This ppp update fixes a potential security issue that an unprivileged 
attacker could access privileged options:

    * integer overflow in option parsing (CVE-2014-3158, bnc#891489)

Security Issues:

    * CVE-2014-3158
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-08-26"/>
	<updated date="2014-08-26"/>
	<bugzilla href="https://bugzilla.suse.com/891489">SUSE bug 891489</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567058" comment="ppp-2.4.5.git-2.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78455" version="1" class="patch">
	<metadata>
		<title>Security update for procmail</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="894999" ref_url="https://bugzilla.suse.com/894999" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<description>

procmail was updated to fix a security issue in its formail helper.

    * When formail processed specially crafted e-mail headers a heap
      corruption could be triggered, which would lead to a crash of
      formail. (CVE-2014-3618)

Security Issues:

    * CVE-2014-3618
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-09-04"/>
	<updated date="2014-09-04"/>
	<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567059" comment="procmail-3.22-240.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78456" version="1" class="patch">
	<metadata>
		<title>Security update for puppet</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="856843" ref_url="https://bugzilla.suse.com/856843" source="BUGZILLA"/>
		<reference ref_id="879913" ref_url="https://bugzilla.suse.com/879913" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4969" ref_url="https://www.suse.com/security/cve/CVE-2013-4969/" source="CVE"/>
		<reference ref_id="CVE-2014-3248" ref_url="https://www.suse.com/security/cve/CVE-2014-3248/" source="CVE"/>
		<reference ref_id="CVE-2014-3250" ref_url="https://www.suse.com/security/cve/CVE-2014-3250/" source="CVE"/>
		<description>

Puppet was updated to fix the following security issues:

    * Unsafe use of temporary files. (CVE-2013-4969)
    * Arbitrary code execution with required social engineering.
      (CVE-2014-3248, CVE-2014-3250)

Security Issues references:

    * CVE-2014-3248
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3248&gt;
    * CVE-2013-4969
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4969&gt;
    * CVE-2014-3250
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3250&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-30"/>
	<updated date="2014-06-30"/>
	<bugzilla href="https://bugzilla.suse.com/856843">SUSE bug 856843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879913">SUSE bug 879913</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4969/">CVE-2013-4969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3248/">CVE-2014-3248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3250/">CVE-2014-3250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567060" comment="puppet-2.6.18-0.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78457" version="1" class="patch">
	<metadata>
		<title>Security update for pwlib</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="809917" ref_url="https://bugzilla.suse.com/809917" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1864" ref_url="https://www.suse.com/security/cve/CVE-2013-1864/" source="CVE"/>
		<description>

This update fixes a XML DoS vulnerability in pwlib. CVE-2013-1864 has been 
assigned to this issue.

Security Issue reference:

    * CVE-2013-1864
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1864&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-01-27"/>
	<updated date="2014-01-27"/>
	<bugzilla href="https://bugzilla.suse.com/809917">SUSE bug 809917</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1864/">CVE-2013-1864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567061" comment="pwlib-1.10.10-120.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567062" comment="pwlib-plugins-avc-1.10.10-120.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567063" comment="pwlib-plugins-dc-1.10.10-120.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567064" comment="pwlib-plugins-v4l2-1.10.10-120.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78458" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This python update fixes a certificate hostname issue.

    * bnc#834601: CVE-2013-4238: python: SSL module does not handle
      certificates that contain hostnames with NULL bytes

Security Issue reference:

    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-09-27"/>
	<updated date="2013-09-27"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566177" comment="libpython2_6-1_0-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566178" comment="libpython2_6-1_0-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566179" comment="python-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566180" comment="python-base-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566181" comment="python-base-32bit-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566182" comment="python-curses-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566183" comment="python-devel-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563127" comment="python-tk-2.6.8-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566184" comment="python-xml-2.6.8-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78459" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="898572" ref_url="https://bugzilla.suse.com/898572" source="BUGZILLA"/>
		<reference ref_id="901715" ref_url="https://bugzilla.suse.com/901715" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185/" source="CVE"/>
		<description>

Python was updated to fix one security issue:

    * Potential wraparound/overflow in buffer() (CVE-2014-7185)

As an additional hardening measure SSLv2 has been disabled (bnc#901715).

Security Issues:

    * CVE-2014-7185
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901715">SUSE bug 901715</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567065" comment="libpython2_6-1_0-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567066" comment="libpython2_6-1_0-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567067" comment="python-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567068" comment="python-base-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567069" comment="python-base-32bit-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567070" comment="python-curses-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567071" comment="python-devel-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563788" comment="python-tk-2.6.9-0.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567072" comment="python-xml-2.6.9-0.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78460" version="1" class="patch">
	<metadata>
		<title>Security update for python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="834601" ref_url="https://bugzilla.suse.com/834601" source="BUGZILLA"/>
		<reference ref_id="847135" ref_url="https://bugzilla.suse.com/847135" source="BUGZILLA"/>
		<reference ref_id="856836" ref_url="https://bugzilla.suse.com/856836" source="BUGZILLA"/>
		<reference ref_id="859068" ref_url="https://bugzilla.suse.com/859068" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4073" ref_url="https://www.suse.com/security/cve/CVE-2013-4073/" source="CVE"/>
		<reference ref_id="CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238/" source="CVE"/>
		<description>

This update for Python fixes the following security issues:

    * bnc#834601: SSL module does not handle certificates that contain
      hostnames with NULL bytes. (CVE-2013-4238)
    * bnc#856836: Various stdlib read flaws. (CVE-2013-1752)

Additionally, the following non-security issues have been fixed:

    * bnc#859068: Turn off OpenSSL's aggressive optimizations that conflict
      with Python's GC.
    * bnc#847135: Setting fips=1 at boot time causes problems with Python
      due to MD5 usage.

Security Issue references:

    * CVE-2013-4073
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073&gt;
    * CVE-2013-4238
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-24"/>
	<updated date="2014-02-24"/>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847135">SUSE bug 847135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/859068">SUSE bug 859068</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4073/">CVE-2013-4073</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567073" comment="libpython2_6-1_0-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567074" comment="libpython2_6-1_0-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567075" comment="python-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567076" comment="python-base-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567077" comment="python-base-32bit-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567078" comment="python-curses-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567079" comment="python-devel-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563796" comment="python-tk-2.6.9-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567080" comment="python-xml-2.6.9-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78461" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="863741" ref_url="https://bugzilla.suse.com/863741" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912/" source="CVE"/>
		<description>

Python was updated to fix a security issue in the socket.recvfrom_into 
function, where data could be written over the end of the buffer. 
(CVE-2014-1912)

Security Issue reference:

    * CVE-2014-1912
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-01"/>
	<updated date="2014-04-01"/>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567081" comment="libpython2_6-1_0-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567082" comment="libpython2_6-1_0-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567083" comment="python-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567084" comment="python-base-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567085" comment="python-base-32bit-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567086" comment="python-curses-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567087" comment="python-devel-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563804" comment="python-tk-2.6.9-0.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567088" comment="python-xml-2.6.9-0.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78462" version="1" class="patch">
	<metadata>
		<title>Security update for Python</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="872848" ref_url="https://bugzilla.suse.com/872848" source="BUGZILLA"/>
		<reference ref_id="885882" ref_url="https://bugzilla.suse.com/885882" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<description>

This update for Python provides fixes for the following issues:

    * CGIHTTPServer file disclosure and directory traversal through
      URL-encoded characters. (CVE-2014-4650)
    * The 'urlparse' module has been updated to correctly parse IPv6
      addresses. (bnc#872848)
    * Correctly enable IPv6 support.

Security Issues:

    * CVE-2014-4650
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-07-28"/>
	<updated date="2014-07-28"/>
	<bugzilla href="https://bugzilla.suse.com/872848">SUSE bug 872848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567089" comment="libpython2_6-1_0-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567090" comment="libpython2_6-1_0-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567091" comment="python-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567092" comment="python-base-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567093" comment="python-base-32bit-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567094" comment="python-curses-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567095" comment="python-devel-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563812" comment="python-tk-2.6.9-0.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567096" comment="python-xml-2.6.9-0.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78463" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="877258" ref_url="https://bugzilla.suse.com/877258" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3146" ref_url="https://www.suse.com/security/cve/CVE-2014-3146/" source="CVE"/>
		<description>

This security update for python-lxml fixes a input sanitization flaw in 
clean_html. (CVE-2014-3146)

Security Issues:

    * CVE-2014-3146
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3146&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-01"/>
	<updated date="2014-10-01"/>
	<bugzilla href="https://bugzilla.suse.com/877258">SUSE bug 877258</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3146/">CVE-2014-3146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567097" comment="python-lxml-2.3.6-0.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78464" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843759" ref_url="https://bugzilla.suse.com/843759" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1633" ref_url="https://www.suse.com/security/cve/CVE-2013-1633/" source="CVE"/>
		<description>

python-setuptools so far used only HTTP to retrieve packages, which could 
have lead to man in the middle attacks on newly installed python code.

This update adjusts it to use HTTPS, guaranteeing better connection 
integrity.

Security Issue reference:

    * CVE-2013-1633
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1633&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-09"/>
	<updated date="2014-04-09"/>
	<bugzilla href="https://bugzilla.suse.com/843759">SUSE bug 843759</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1633/">CVE-2013-1633</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567098" comment="python-setuptools-0.6c8-10.19.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78465" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="930189" ref_url="https://bugzilla.suse.com/930189" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7440" ref_url="https://www.suse.com/security/cve/CVE-2013-7440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001606.html" source="SUSE-SU"/>
		<description>
python-setuptools was updated to fix one security issue.

The following vulnerability was fixed:

* CVE-2013-7440: Non-RFC6125-compliant host name matching was incorrect (bsc#930189)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930189">SUSE bug 930189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7440/">CVE-2013-7440</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567099" comment="python-setuptools-0.6c11-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78466" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="940191" ref_url="https://bugzilla.suse.com/940191" source="BUGZILLA"/>
		<reference ref_id="946204" ref_url="https://bugzilla.suse.com/946204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001620.html" source="SUSE-SU"/>
		<description>

A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-18"/>
	<updated date="2015-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567100" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78467" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<description>

This update for rsync fixes two security issues:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567101" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78468" version="1" class="patch">
	<metadata>
		<title>Security update for Ruby</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="808137" ref_url="https://bugzilla.suse.com/808137" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1821" ref_url="https://www.suse.com/security/cve/CVE-2013-1821/" source="CVE"/>
		<description>

This Ruby update fixes the following security issue:

    * bnc#808137: Fixed entity expansion DoS vulnerability in REXML
      (CVE-2013-1821).

Security Issue reference:

    * CVE-2013-1821
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-04-15"/>
	<updated date="2014-04-15"/>
	<bugzilla href="https://bugzilla.suse.com/808137">SUSE bug 808137</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1821/">CVE-2013-1821</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567102" comment="ruby-1.8.7.p357-0.9.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78469" version="1" class="patch">
	<metadata>
		<title>Security update for rxvt-unicode</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="876101" ref_url="https://bugzilla.suse.com/876101" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3121" ref_url="https://www.suse.com/security/cve/CVE-2014-3121/" source="CVE"/>
		<description>

rxvt-unicode was updated to ensure that window property values can not be 
queried in secure mode. (CVE-2014-3121)

Security Issue reference:

    * CVE-2014-3121
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3121&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-20"/>
	<updated date="2014-06-20"/>
	<bugzilla href="https://bugzilla.suse.com/876101">SUSE bug 876101</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3121/">CVE-2014-3121</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567103" comment="rxvt-unicode-9.05-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78470" version="1" class="patch">
	<metadata>
		<title>Security update for Samba</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="872912" ref_url="https://bugzilla.suse.com/872912" source="BUGZILLA"/>
		<reference ref_id="898031" ref_url="https://bugzilla.suse.com/898031" source="BUGZILLA"/>
		<reference ref_id="899558" ref_url="https://bugzilla.suse.com/899558" source="BUGZILLA"/>
		<reference ref_id="913001" ref_url="https://bugzilla.suse.com/913001" source="BUGZILLA"/>
		<reference ref_id="917376" ref_url="https://bugzilla.suse.com/917376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html" source="SUSE-SU"/>
		<description>

Samba has been updated to fix one security issue:

    * CVE-2015-0240: Don't call talloc_free on an uninitialized pointer
      (bnc#917376).

Additionally, these non-security issues have been fixed:

    * Realign the winbind request structure following require_membership_of
      field expansion (bnc#913001).
    * Reuse connections derived from DFS referrals (bso#10123,
      fate#316512).
    * Set domain/workgroup based on authentication callback value
      (bso#11059).
    * Fix spoolss error response marshalling (bso#10984).
    * Fix spoolss EnumJobs and GetJob responses (bso#10905, bnc#898031).
    * Fix handling of bad EnumJobs levels (bso#10898).
    * Fix small memory-leak in the background print process; (bnc#899558).
    * Prune idle or hung connections older than 'winbind request timeout'
      (bso#3204, bnc#872912).

Security Issues:

    * CVE-2015-0240
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-17"/>
	<updated date="2015-02-17"/>
	<bugzilla href="https://bugzilla.suse.com/872912">SUSE bug 872912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898031">SUSE bug 898031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899558">SUSE bug 899558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913001">SUSE bug 913001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567104" comment="libldb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567105" comment="libldb1-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567106" comment="libsmbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567107" comment="libsmbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567108" comment="libtalloc2-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567109" comment="libtalloc2-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567110" comment="libtdb1-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567111" comment="libtdb1-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567112" comment="libtevent0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567113" comment="libtevent0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567114" comment="libwbclient0-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567115" comment="libwbclient0-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567116" comment="samba-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567117" comment="samba-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567118" comment="samba-client-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567119" comment="samba-client-32bit-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567120" comment="samba-doc-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567121" comment="samba-krb-printing-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567122" comment="samba-winbind-3.6.3-0.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567123" comment="samba-winbind-32bit-3.6.3-0.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78471" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586)
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582)
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584)
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583)

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022)
- Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382)
- Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382)
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299)
- Take resource group sids into account when caching netsamlogon data (bnc#912457)
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244)
- dependency issue with samba-winbind (bnc#936909)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567124" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567125" comment="libldb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567126" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567127" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567128" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567129" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567130" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567131" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567132" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567133" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567134" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567135" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567136" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567137" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567138" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567139" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567141" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567142" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567143" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78472" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567144" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78473" version="1" class="patch">
	<metadata>
		<title>Security update for shim</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="813448" ref_url="https://bugzilla.suse.com/813448" source="BUGZILLA"/>
		<reference ref_id="863205" ref_url="https://bugzilla.suse.com/863205" source="BUGZILLA"/>
		<reference ref_id="866690" ref_url="https://bugzilla.suse.com/866690" source="BUGZILLA"/>
		<reference ref_id="875385" ref_url="https://bugzilla.suse.com/875385" source="BUGZILLA"/>
		<reference ref_id="889332" ref_url="https://bugzilla.suse.com/889332" source="BUGZILLA"/>
		<reference ref_id="889765" ref_url="https://bugzilla.suse.com/889765" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>

shim has been updated to fix three security issues:

    * OOB read access when parsing DHCPv6 packets (remote DoS)
      (CVE-2014-3675).
    * Heap overflow when parsing IPv6 addresses provided by tftp:// DHCPv6
      boot option (RCE) (CVE-2014-3676).
    * Memory corruption when processing user provided MOK lists
      (CVE-2014-3677).

Security Issues:

    * CVE-2014-3675
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675&gt;
    * CVE-2014-3676
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676&gt;
    * CVE-2014-3677
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-19"/>
	<updated date="2014-11-19"/>
	<bugzilla href="https://bugzilla.suse.com/813448">SUSE bug 813448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863205">SUSE bug 863205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866690">SUSE bug 866690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875385">SUSE bug 875385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889765">SUSE bug 889765</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567145" comment="shim-0.7.318.81ee561d-0.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78474" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="876449" ref_url="https://bugzilla.suse.com/876449" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-2891" ref_url="https://www.suse.com/security/cve/CVE-2014-2891/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001492.html" source="SUSE-SU"/>
		<description>

This update fixes a NULL ptr dereference (DoS) via ID_DER_ASN1_DN ID 
payloads.

Security Issue reference:

    * CVE-2014-2891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2891&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-14"/>
	<updated date="2014-05-14"/>
	<bugzilla href="https://bugzilla.suse.com/876449">SUSE bug 876449</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2891/">CVE-2014-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567146" comment="strongswan-4.4.0-6.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567147" comment="strongswan-doc-4.4.0-6.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78475" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567148" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567149" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78476" version="1" class="patch">
	<metadata>
		<title>Security update for sudo</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="863025" ref_url="https://bugzilla.suse.com/863025" source="BUGZILLA"/>
		<reference ref_id="866503" ref_url="https://bugzilla.suse.com/866503" source="BUGZILLA"/>
		<reference ref_id="868444" ref_url="https://bugzilla.suse.com/868444" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0106" ref_url="https://www.suse.com/security/cve/CVE-2014-0106/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001420.html" source="SUSE-SU"/>
		<description>

This collective update for sudo provides fixes for the following issues:

    * Security policy bypass when env_reset is disabled. (CVE-2014-0106,
      bnc#866503)
    * Regression in the previous update that causes a segmentation fault
      when running 'sudo -s'. (bnc#868444)
    * Command 'who -m' prints no output when using log_input/log_output
      sudo options. (bnc#863025)

Security Issues references:

    * CVE-2014-0106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-20"/>
	<updated date="2014-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/863025">SUSE bug 863025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866503">SUSE bug 866503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868444">SUSE bug 868444</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0106/">CVE-2014-0106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567150" comment="sudo-1.7.6p2-0.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78477" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="922220" ref_url="https://bugzilla.suse.com/922220" source="BUGZILLA"/>
		<reference ref_id="922222" ref_url="https://bugzilla.suse.com/922222" source="BUGZILLA"/>
		<reference ref_id="923142" ref_url="https://bugzilla.suse.com/923142" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<description>

When running tcpdump, a remote unauthenticated user could have crashed the 
application or, potentially, execute arbitrary code by injecting crafted 
packages into the network.

The following vulnerabilities in protocol printers have been fixed:

    * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220)
    * Ethernet printer remote DoS (CVE-2015-2154, bnc#922222)
    * PPP printer remote DoS (CVE-2014-9140, bnc#923142)

Security Issues:

    * CVE-2015-0261
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261&gt;
    * CVE-2015-2154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154&gt;
    * CVE-2014-9140
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-20"/>
	<updated date="2015-03-20"/>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567151" comment="tcpdump-3.9.8-1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78478" version="1" class="patch">
	<metadata>
		<title>Security update for telepathy-idle</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="817120" ref_url="https://bugzilla.suse.com/817120" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-6746" ref_url="https://www.suse.com/security/cve/CVE-2007-6746/" source="CVE"/>
		<description>

Telepathy-idle did not check SSL certificates. CVE-2007-6746 was assigned 
to this issue.

Security Issue reference:

    * CVE-2007-6746
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6746&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-08-15"/>
	<updated date="2013-08-15"/>
	<bugzilla href="https://bugzilla.suse.com/817120">SUSE bug 817120</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6746/">CVE-2007-6746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566189" comment="telepathy-idle-0.1.5-1.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78479" version="1" class="patch">
	<metadata>
		<title>Security update for tidy (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="933588" ref_url="https://bugzilla.suse.com/933588" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522/" source="CVE"/>
		<reference ref_id="CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001586.html" source="SUSE-SU"/>
		<description>

This update fixes two heap-based buffer overflows in tidy/libtidy. These vulnerabilities
could allow remote attackers to cause a denial of service (crash) via vectors involving
a command character in an href. (CVE-2015-5522, CVE-2015-5523)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-26"/>
	<updated date="2015-08-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/933588">SUSE bug 933588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567152" comment="libtidy-1.0-37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78480" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567153" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78481" version="1" class="patch">
	<metadata>
		<title>Security update for unzip</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="909214" ref_url="https://bugzilla.suse.com/909214" source="BUGZILLA"/>
		<reference ref_id="914442" ref_url="https://bugzilla.suse.com/914442" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

    * CVE-2014-8139: input sanitization errors (bnc#909214)
    * CVE-2014-9636: out-of-bounds read/write in test_compr_eb()
      (bnc#914442)

Security Issues:

    * CVE-2014-9636
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636&gt;
    * CVE-2014-8139
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-02-20"/>
	<updated date="2015-02-20"/>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567155" comment="unzip-6.00-11.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78482" version="1" class="patch">
	<metadata>
		<title>Security update for vino</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="843174" ref_url="https://bugzilla.suse.com/843174" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-5745" ref_url="https://www.suse.com/security/cve/CVE-2013-5745/" source="CVE"/>
		<description>

vino has been updated to fix a remote denial of service problem where 
remote attackers could have caused a infinite loop in vino (CPU 
consumption). (CVE-2013-5745)

Security Issue reference:

    * CVE-2013-5745
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5745&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-17"/>
	<updated date="2013-10-17"/>
	<bugzilla href="https://bugzilla.suse.com/843174">SUSE bug 843174</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5745/">CVE-2013-5745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566191" comment="vino-2.28.1-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566192" comment="vino-lang-2.28.1-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78483" version="1" class="patch">
	<metadata>
		<title>Security update for vorbis-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="914439" ref_url="https://bugzilla.suse.com/914439" source="BUGZILLA"/>
		<reference ref_id="914441" ref_url="https://bugzilla.suse.com/914441" source="BUGZILLA"/>
		<reference ref_id="943795" ref_url="https://bugzilla.suse.com/943795" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<description>

vorbis-tools was updated to fix several security issues.

- A buffer overflow in aiff_open() that could be triggered
  by opening prepared malicious files (CVE-2015-6749, bsc#943795).

- A division by zero and integer overflow by crafted WAV files was fixed
  (CVE-2014-9638, CVE-2014-9639, bnc#914439, bnc#914441).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943795">SUSE bug 943795</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567156" comment="vorbis-tools-1.1.1-174.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78484" version="1" class="patch">
	<metadata>
		<title>Security update for wget</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="885069" ref_url="https://bugzilla.suse.com/885069" source="BUGZILLA"/>
		<reference ref_id="901276" ref_url="https://bugzilla.suse.com/901276" source="BUGZILLA"/>
		<reference ref_id="902709" ref_url="https://bugzilla.suse.com/902709" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<description>

wget has been updated to fix one security issue and two non-security 
issues.

This security issue has been fixed:

    * FTP symlink arbitrary filesystem access (CVE-2014-4877).

These non-security issues have been fixed:

    * Fix displaying of download time (bnc#901276).
    * Fix 0 size FTP downloads after failure (bnc#885069).

Security Issues:

    * CVE-2014-4877
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-05"/>
	<updated date="2014-11-05"/>
	<bugzilla href="https://bugzilla.suse.com/885069">SUSE bug 885069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901276">SUSE bug 901276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567157" comment="wget-1.11.4-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78485" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="899303" ref_url="https://bugzilla.suse.com/899303" source="BUGZILLA"/>
		<reference ref_id="905245" ref_url="https://bugzilla.suse.com/905245" source="BUGZILLA"/>
		<reference ref_id="905246" ref_url="https://bugzilla.suse.com/905246" source="BUGZILLA"/>
		<reference ref_id="905247" ref_url="https://bugzilla.suse.com/905247" source="BUGZILLA"/>
		<reference ref_id="905248" ref_url="https://bugzilla.suse.com/905248" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<description>

wireshark has been updated to version 1.10.11 to fix five security issues.

These security issues have been fixed:

    * SigComp UDVM buffer overflow (CVE-2014-8710).
    * AMQP dissector crash (CVE-2014-8711).
    * NCP dissector crashes (CVE-2014-8712, CVE-2014-8713).
    * TN5250 infinite loops (CVE-2014-8714).

This non-security issue has been fixed:

    * enable zlib (bnc#899303).

Further bug fixes and updated protocol support as listed in:

https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html
&lt;https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html&gt;

Security Issues:

    * CVE-2014-8711
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711&gt;
    * CVE-2014-8710
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710&gt;
    * CVE-2014-8714
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714&gt;
    * CVE-2014-8712
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712&gt;
    * CVE-2014-8713
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-14"/>
	<updated date="2014-11-14"/>
	<bugzilla href="https://bugzilla.suse.com/899303">SUSE bug 899303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905245">SUSE bug 905245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905246">SUSE bug 905246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905247">SUSE bug 905247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905248">SUSE bug 905248</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563891" comment="wireshark-1.10.11-0.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78486" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78487" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78488" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="868937" ref_url="https://bugzilla.suse.com/868937" source="BUGZILLA"/>
		<reference ref_id="900611" ref_url="https://bugzilla.suse.com/900611" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<description>

This update fixes a remote code execution vulnerability in wpa_supplicant's 
wpa_cli and hostapd_cli tools. CVE-2014-3686 has been assigned to this 
issue.

Additionally, password based authentication with PKCS#5v2 has been enabled.

Security Issues:

    * CVE-2014-3686
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-15"/>
	<updated date="2014-10-15"/>
	<bugzilla href="https://bugzilla.suse.com/868937">SUSE bug 868937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567158" comment="wpa_supplicant-0.7.1-6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567159" comment="wpa_supplicant-gui-0.7.1-6.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78489" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="930077" ref_url="https://bugzilla.suse.com/930077" source="BUGZILLA"/>
		<reference ref_id="930078" ref_url="https://bugzilla.suse.com/930078" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<description>
wpa_supplicant was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd and wpa_supplicant, when used for AP mode MLME/SME functionality, allowed remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read (bsc#930078).
- CVE-2015-4141: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), allowed remote attackers to cause a denial of service (crash) via a negative chunk length, which triggered an out-of-bounds read or heap-based buffer overflow (bsc#930077).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567160" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567161" comment="wpa_supplicant-gui-0.7.1-6.17.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78490" version="1" class="patch">
	<metadata>
		<title>Security update for xalan-j2</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="870082" ref_url="https://bugzilla.suse.com/870082" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>

xalan-j2 has been updated to ensure that secure processing can't be 
circumvented (CVE-2014-0107).

Security Issues:

    * CVE-2014-0107
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-06-23"/>
	<updated date="2014-06-23"/>
	<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567162" comment="xalan-j2-2.7.0-217.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78491" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="910441" ref_url="https://bugzilla.suse.com/910441" source="BUGZILLA"/>
		<reference ref_id="927967" ref_url="https://bugzilla.suse.com/927967" source="BUGZILLA"/>
		<reference ref_id="929339" ref_url="https://bugzilla.suse.com/929339" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix two security issues and a bug:

    * CVE-2015-3456: A buffer overflow in the floppy drive emulation, which
      could be used to carry out denial of service attacks or potential
      code execution against the host. This vulnerability is also known as
      VENOM.
    * CVE-2015-3340: Xen did not initialize certain fields, which allowed
      certain remote service domains to obtain sensitive information from
      memory via a (1) XEN_DOMCTL_gettscinfo or (2)
      XEN_SYSCTL_getdomaininfolist request.
    * An exception in setCPUAffinity when restoring guests. (bsc#910441)

Security Issues:

    * CVE-2015-3456
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456&gt;
    * CVE-2015-3340
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-05-13"/>
	<updated date="2015-05-13"/>
	<bugzilla href="https://bugzilla.suse.com/910441">SUSE bug 910441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567163" comment="xen-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567164" comment="xen-doc-html-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567165" comment="xen-doc-pdf-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567166" comment="xen-kmp-default-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567167" comment="xen-kmp-pae-4.2.5_06_3.0.101_0.47.52-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567168" comment="xen-libs-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567169" comment="xen-libs-32bit-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567170" comment="xen-tools-4.2.5_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567171" comment="xen-tools-domU-4.2.5_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78492" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="866902" ref_url="https://bugzilla.suse.com/866902" source="BUGZILLA"/>
		<reference ref_id="882089" ref_url="https://bugzilla.suse.com/882089" source="BUGZILLA"/>
		<reference ref_id="896023" ref_url="https://bugzilla.suse.com/896023" source="BUGZILLA"/>
		<reference ref_id="901317" ref_url="https://bugzilla.suse.com/901317" source="BUGZILLA"/>
		<reference ref_id="903850" ref_url="https://bugzilla.suse.com/903850" source="BUGZILLA"/>
		<reference ref_id="903967" ref_url="https://bugzilla.suse.com/903967" source="BUGZILLA"/>
		<reference ref_id="903970" ref_url="https://bugzilla.suse.com/903970" source="BUGZILLA"/>
		<reference ref_id="905465" ref_url="https://bugzilla.suse.com/905465" source="BUGZILLA"/>
		<reference ref_id="905467" ref_url="https://bugzilla.suse.com/905467" source="BUGZILLA"/>
		<reference ref_id="906439" ref_url="https://bugzilla.suse.com/906439" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8594" ref_url="https://www.suse.com/security/cve/CVE-2014-8594/" source="CVE"/>
		<reference ref_id="CVE-2014-8595" ref_url="https://www.suse.com/security/cve/CVE-2014-8595/" source="CVE"/>
		<reference ref_id="CVE-2014-8866" ref_url="https://www.suse.com/security/cve/CVE-2014-8866/" source="CVE"/>
		<reference ref_id="CVE-2014-8867" ref_url="https://www.suse.com/security/cve/CVE-2014-8867/" source="CVE"/>
		<reference ref_id="CVE-2014-9030" ref_url="https://www.suse.com/security/cve/CVE-2014-9030/" source="CVE"/>
		<description>

Xen has been updated to version 4.2.5 with additional patches to fix six 
security issues:

    * Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
      (CVE-2014-9030).
    * Insufficient bounding of 'REP MOVS' to MMIO emulated inside the
      hypervisor (CVE-2014-8867).
    * Excessive checking in compatibility mode hypercall argument
      translation (CVE-2014-8866).
    * Guest user mode triggerable VM exits not handled by hypervisor
      (bnc#903850).
    * Missing privilege level checks in x86 emulation of far branches
      (CVE-2014-8595).
    * Insufficient restrictions on certain MMU update hypercalls
      (CVE-2014-8594).

These non-security issues have been fixed:

    * Xen save/restore of HVM guests cuts off disk and networking
      (bnc#866902).
    * Windows 2012 R2 fails to boot up with greater than 60 vcpus
      (bnc#882089).
    * Increase limit domUloader to 32MB (bnc#901317).
    * Adjust xentop column layout (bnc#896023).

Security Issues:

    * CVE-2014-9030
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030&gt;
    * CVE-2014-8867
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867&gt;
    * CVE-2014-8866
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866&gt;
    * CVE-2014-8595
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595&gt;
    * CVE-2014-8594
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-11-27"/>
	<updated date="2014-11-27"/>
	<bugzilla href="https://bugzilla.suse.com/866902">SUSE bug 866902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882089">SUSE bug 882089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896023">SUSE bug 896023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901317">SUSE bug 901317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903850">SUSE bug 903850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905465">SUSE bug 905465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905467">SUSE bug 905467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906439">SUSE bug 906439</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8594/">CVE-2014-8594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8595/">CVE-2014-8595</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8866/">CVE-2014-8866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8867/">CVE-2014-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9030/">CVE-2014-9030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567172" comment="xen-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567173" comment="xen-doc-html-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567174" comment="xen-doc-pdf-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567175" comment="xen-kmp-default-4.2.5_02_3.0.101_0.40-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567176" comment="xen-libs-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567177" comment="xen-libs-32bit-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567178" comment="xen-tools-4.2.5_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567179" comment="xen-tools-domU-4.2.5_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78493" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="922709" ref_url="https://bugzilla.suse.com/922709" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2751" ref_url="https://www.suse.com/security/cve/CVE-2015-2751/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<description>

xen was updated to fix the following security issues:

* CVE-2015-5165: QEMU leak of uninitialized heap memory in rtl8139 device model (bsc#939712, XSA-140)
* CVE-2015-5166: Use after free in QEMU/Xen block unplug protocol (bsc#939709, XSA-139)
* CVE-2015-2751: Certain domctl operations could have be used to lock up the host (bsc#922709, XSA-127)
* CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137)
* CVE-2015-4164: DoS through iret hypercall handler (bsc#932996, XSA-136)
* CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/922709">SUSE bug 922709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2751/">CVE-2015-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567180" comment="xen-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567181" comment="xen-doc-html-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567182" comment="xen-doc-pdf-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567183" comment="xen-kmp-default-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567184" comment="xen-kmp-pae-4.2.5_12_3.0.101_0.47.55-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567185" comment="xen-libs-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567186" comment="xen-libs-32bit-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567187" comment="xen-tools-4.2.5_12-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567188" comment="xen-tools-domU-4.2.5_12-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78494" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="941074" ref_url="https://bugzilla.suse.com/941074" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<description>
xen was updated to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bsc#941074: Device 51728 could not be connected. Hotplug scripts not working
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941074">SUSE bug 941074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567189" comment="xen-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567190" comment="xen-doc-html-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567191" comment="xen-doc-pdf-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567192" comment="xen-kmp-default-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567193" comment="xen-kmp-pae-4.2.5_14_3.0.101_0.47.67-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567194" comment="xen-libs-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567195" comment="xen-libs-32bit-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567196" comment="xen-tools-4.2.5_14-18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567197" comment="xen-tools-domU-4.2.5_14-18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78495" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="801663" ref_url="https://bugzilla.suse.com/801663" source="BUGZILLA"/>
		<reference ref_id="808085" ref_url="https://bugzilla.suse.com/808085" source="BUGZILLA"/>
		<reference ref_id="808269" ref_url="https://bugzilla.suse.com/808269" source="BUGZILLA"/>
		<reference ref_id="817210" ref_url="https://bugzilla.suse.com/817210" source="BUGZILLA"/>
		<reference ref_id="820917" ref_url="https://bugzilla.suse.com/820917" source="BUGZILLA"/>
		<reference ref_id="820919" ref_url="https://bugzilla.suse.com/820919" source="BUGZILLA"/>
		<reference ref_id="820920" ref_url="https://bugzilla.suse.com/820920" source="BUGZILLA"/>
		<reference ref_id="823011" ref_url="https://bugzilla.suse.com/823011" source="BUGZILLA"/>
		<reference ref_id="823608" ref_url="https://bugzilla.suse.com/823608" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2194" ref_url="https://www.suse.com/security/cve/CVE-2013-2194/" source="CVE"/>
		<reference ref_id="CVE-2013-2195" ref_url="https://www.suse.com/security/cve/CVE-2013-2195/" source="CVE"/>
		<reference ref_id="CVE-2013-2196" ref_url="https://www.suse.com/security/cve/CVE-2013-2196/" source="CVE"/>
		<description>

The Xen hypervisor and toolset has been updated to 4.2.2_06 to fix various 
bugs and security issues:

The following security issues have been addressed:

    * CVE-2013-2194: Various integer overflows in the ELF loader were
      fixed. (XSA-55)
    * CVE-2013-2195: Various pointer dereferences issues in the ELF loader
      were fixed. (XSA-55)
    * CVE-2013-2196: Various other problems in the ELF loader were fixed.
      (XSA-55)
    * CVE-2013-2078: A Hypervisor crash due to missing exception recovery
      on XSETBV was fixed. (XSA-54)
    * CVE-2013-2077: A Hypervisor crash due to missing exception recovery
      on XRSTOR was fixed. (XSA-53)
    * CVE-2013-2211: libxl allowed guest write access to sensitive console
      related xenstore keys. (XSA-57)
    * CVE-2013-2076: An information leak on XSAVE/XRSTOR capable AMD CPUs
      (XSA-52) was fixed, where parts of this state could leak to other
      VMs.

Also the following bugs have been fixed:

    * performance issues in mirror lvm (bnc#801663)
    * aacraid driver panics mapping INT A when booting kernel-xen
      (bnc#808085)
    * Fully Virtualized Windows VM install failed on Ivy Bridge platforms
      with Xen kernel (bnc#808269)
    * Did not boot with i915 graphics controller with VT-d enabled
      (bnc#817210)

Security Issue references:

    * CVE-2013-2194
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194&gt;
    * CVE-2013-2195
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195&gt;
    * CVE-2013-2196
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-07-15"/>
	<updated date="2013-07-15"/>
	<bugzilla href="https://bugzilla.suse.com/801663">SUSE bug 801663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808085">SUSE bug 808085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808269">SUSE bug 808269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817210">SUSE bug 817210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820917">SUSE bug 820917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820919">SUSE bug 820919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820920">SUSE bug 820920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823608">SUSE bug 823608</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2194/">CVE-2013-2194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2195/">CVE-2013-2195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2196/">CVE-2013-2196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567198" comment="xen-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567199" comment="xen-doc-html-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567200" comment="xen-doc-pdf-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567201" comment="xen-kmp-default-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567202" comment="xen-kmp-pae-4.2.2_06_3.0.82_0.7-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567203" comment="xen-libs-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567204" comment="xen-libs-32bit-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567205" comment="xen-tools-4.2.2_06-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567206" comment="xen-tools-domU-4.2.2_06-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78496" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="817799" ref_url="https://bugzilla.suse.com/817799" source="BUGZILLA"/>
		<reference ref_id="824676" ref_url="https://bugzilla.suse.com/824676" source="BUGZILLA"/>
		<reference ref_id="826882" ref_url="https://bugzilla.suse.com/826882" source="BUGZILLA"/>
		<reference ref_id="828623" ref_url="https://bugzilla.suse.com/828623" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="833796" ref_url="https://bugzilla.suse.com/833796" source="BUGZILLA"/>
		<reference ref_id="834751" ref_url="https://bugzilla.suse.com/834751" source="BUGZILLA"/>
		<reference ref_id="835896" ref_url="https://bugzilla.suse.com/835896" source="BUGZILLA"/>
		<reference ref_id="836239" ref_url="https://bugzilla.suse.com/836239" source="BUGZILLA"/>
		<reference ref_id="839596" ref_url="https://bugzilla.suse.com/839596" source="BUGZILLA"/>
		<reference ref_id="839600" ref_url="https://bugzilla.suse.com/839600" source="BUGZILLA"/>
		<reference ref_id="840196" ref_url="https://bugzilla.suse.com/840196" source="BUGZILLA"/>
		<reference ref_id="840592" ref_url="https://bugzilla.suse.com/840592" source="BUGZILLA"/>
		<reference ref_id="841766" ref_url="https://bugzilla.suse.com/841766" source="BUGZILLA"/>
		<reference ref_id="842511" ref_url="https://bugzilla.suse.com/842511" source="BUGZILLA"/>
		<reference ref_id="842512" ref_url="https://bugzilla.suse.com/842512" source="BUGZILLA"/>
		<reference ref_id="842513" ref_url="https://bugzilla.suse.com/842513" source="BUGZILLA"/>
		<reference ref_id="842514" ref_url="https://bugzilla.suse.com/842514" source="BUGZILLA"/>
		<reference ref_id="842515" ref_url="https://bugzilla.suse.com/842515" source="BUGZILLA"/>
		<reference ref_id="845520" ref_url="https://bugzilla.suse.com/845520" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1432" ref_url="https://www.suse.com/security/cve/CVE-2013-1432/" source="CVE"/>
		<reference ref_id="CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442/" source="CVE"/>
		<reference ref_id="CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918/" source="CVE"/>
		<reference ref_id="CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355/" source="CVE"/>
		<reference ref_id="CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361/" source="CVE"/>
		<reference ref_id="CVE-2013-4368" ref_url="https://www.suse.com/security/cve/CVE-2013-4368/" source="CVE"/>
		<reference ref_id="CVE-2013-4369" ref_url="https://www.suse.com/security/cve/CVE-2013-4369/" source="CVE"/>
		<reference ref_id="CVE-2013-4370" ref_url="https://www.suse.com/security/cve/CVE-2013-4370/" source="CVE"/>
		<reference ref_id="CVE-2013-4371" ref_url="https://www.suse.com/security/cve/CVE-2013-4371/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<description>

XEN has been updated to version 4.2.3 c/s 26170, fixing various bugs and 
security issues.

    * CVE-2013-4416: XSA-72: Fixed ocaml xenstored that mishandled
      oversized message replies
    * CVE-2013-4355: XSA-63: Fixed information leaks through I/O
      instruction emulation
    * CVE-2013-4361: XSA-66: Fixed information leak through fbld
      instruction emulation
    * CVE-2013-4368: XSA-67: Fixed information leak through outs
      instruction emulation
    * CVE-2013-4369: XSA-68: Fixed possible null dereference when parsing
      vif ratelimiting info
    * CVE-2013-4370: XSA-69: Fixed misplaced free in ocaml
      xc_vcpu_getaffinity stub
    * CVE-2013-4371: XSA-70: Fixed use-after-free in libxl_list_cpupool
      under memory pressure
    * CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak
    * CVE-2013-1442: XSA-62: Fixed information leak on AVX and/or LWP
      capable CPUs
    * CVE-2013-1432: XSA-58: Page reference counting error due to
      XSA-45/CVE-2013-1918 fixes.

Various bugs have also been fixed:

    * Boot failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * Improvements to block-dmmd script (bnc#828623)
    * MTU size on Dom0 gets reset when booting DomU with e1000 device
      (bnc#840196)
    * In HP's UEFI x86_64 platform and with xen environment, in booting
      stage, xen hypervisor will panic. (bnc#833251)
    * Xen: migration broken from xsave-capable to xsave-incapable host
      (bnc#833796)
    * In xen, 'shutdown -y 0 -h' cannot power off system (bnc#834751)
    * In HP's UEFI x86_64 platform with xen environment, xen hypervisor
      will panic on multiple blades nPar. (bnc#839600)
    * vcpus not started after upgrading Dom0 from SLES 11 SP2 to SP3
      (bnc#835896)
    * SLES 11 SP3 Xen security patch does not automatically update UEFI
      boot binary (bnc#836239)
    * Failed to setup devices for vm instance when start multiple vms
      simultaneously (bnc#824676)
    * SLES 9 SP4 guest fails to start after upgrading to SLES 11 SP3
      (bnc#817799)
    * Various upstream fixes have been included.

Security Issues:

    * CVE-2013-1432
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432&gt;
    * CVE-2013-1442
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442&gt;
    * CVE-2013-1918
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918&gt;
    * CVE-2013-4355
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355&gt;
    * CVE-2013-4361
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361&gt;
    * CVE-2013-4368
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368&gt;
    * CVE-2013-4369
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369&gt;
    * CVE-2013-4370
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370&gt;
    * CVE-2013-4371
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371&gt;
    * CVE-2013-4375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-10-29"/>
	<updated date="2013-10-29"/>
	<bugzilla href="https://bugzilla.suse.com/817799">SUSE bug 817799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824676">SUSE bug 824676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828623">SUSE bug 828623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833796">SUSE bug 833796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834751">SUSE bug 834751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835896">SUSE bug 835896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836239">SUSE bug 836239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839600">SUSE bug 839600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840196">SUSE bug 840196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842511">SUSE bug 842511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842512">SUSE bug 842512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842513">SUSE bug 842513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842514">SUSE bug 842514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842515">SUSE bug 842515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1432/">CVE-2013-1432</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4368/">CVE-2013-4368</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4369/">CVE-2013-4369</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4370/">CVE-2013-4370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4371/">CVE-2013-4371</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567207" comment="xen-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567208" comment="xen-doc-html-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567209" comment="xen-doc-pdf-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567210" comment="xen-kmp-default-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567211" comment="xen-kmp-pae-4.2.3_02_3.0.93_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567212" comment="xen-libs-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567213" comment="xen-libs-32bit-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567214" comment="xen-tools-4.2.3_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567215" comment="xen-tools-domU-4.2.3_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78497" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="840997" ref_url="https://bugzilla.suse.com/840997" source="BUGZILLA"/>
		<reference ref_id="842417" ref_url="https://bugzilla.suse.com/842417" source="BUGZILLA"/>
		<reference ref_id="846849" ref_url="https://bugzilla.suse.com/846849" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="848657" ref_url="https://bugzilla.suse.com/848657" source="BUGZILLA"/>
		<reference ref_id="849665" ref_url="https://bugzilla.suse.com/849665" source="BUGZILLA"/>
		<reference ref_id="849667" ref_url="https://bugzilla.suse.com/849667" source="BUGZILLA"/>
		<reference ref_id="849668" ref_url="https://bugzilla.suse.com/849668" source="BUGZILLA"/>
		<reference ref_id="851386" ref_url="https://bugzilla.suse.com/851386" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922/" source="CVE"/>
		<reference ref_id="CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007/" source="CVE"/>
		<reference ref_id="CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375/" source="CVE"/>
		<reference ref_id="CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416/" source="CVE"/>
		<reference ref_id="CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494/" source="CVE"/>
		<reference ref_id="CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551/" source="CVE"/>
		<reference ref_id="CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553/" source="CVE"/>
		<reference ref_id="CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554/" source="CVE"/>
		<description>

The Xen hypervisor and tool-suite have been updated to fix security issues 
and bugs:

    * CVE-2013-4494: XSA-73: A lock order reversal between page allocation
      and grant table locks could lead to host crashes or even host code
      execution.
    * CVE-2013-4553: XSA-74: A lock order reversal between page_alloc_lock
      and mm_rwlock could lead to deadlocks.
    * CVE-2013-4554: XSA-76: Hypercalls exposed to privilege rings 1 and 2
      of HVM guests which might lead to Hypervisor escalation under
      specific circumstances.
    * CVE-2013-6375: XSA-78: Insufficient TLB flushing in VT-d (iommu) code
      could lead to access of memory that was revoked.
    * CVE-2013-4551: XSA-75: A host crash due to guest VMX instruction
      execution was fixed.

Non-security bugs have also been fixed:

    * bnc#840997: It is possible to start a VM twice on the same node.
    * bnc#842417: In HP's UEFI x86_64 platform and SLES 11-SP3, dom0 will
      could lock-up on multiple blades nPar.
    * bnc#848014: Xen Hypervisor panics on 8-blades nPar with 46-bit memory
      addressing.
    * bnc#846849: Soft lock-up with PCI pass-through and many VCPUs.
    * bnc#833483: Boot Failure with Xen kernel in UEFI mode with error 'No
      memory for trampoline'.
    * Increase the maximum supported CPUs in the Hypervisor to 512.

Security Issues:

    * CVE-2013-1922
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922&gt;
    * CVE-2013-2007
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007&gt;
    * CVE-2013-4375
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375&gt;
    * CVE-2013-4416
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416&gt;
    * CVE-2013-4494
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494&gt;
    * CVE-2013-4551
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551&gt;
    * CVE-2013-4553
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553&gt;
    * CVE-2013-4554
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-11-27"/>
	<updated date="2013-11-27"/>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840997">SUSE bug 840997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842417">SUSE bug 842417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846849">SUSE bug 846849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849665">SUSE bug 849665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851386">SUSE bug 851386</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567216" comment="xen-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567217" comment="xen-doc-html-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567218" comment="xen-doc-pdf-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567219" comment="xen-kmp-default-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567220" comment="xen-kmp-pae-4.2.3_08_3.0.101_0.8-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567221" comment="xen-libs-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567222" comment="xen-libs-32bit-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567223" comment="xen-tools-4.2.3_08-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567224" comment="xen-tools-domU-4.2.3_08-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78498" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="831120" ref_url="https://bugzilla.suse.com/831120" source="BUGZILLA"/>
		<reference ref_id="833251" ref_url="https://bugzilla.suse.com/833251" source="BUGZILLA"/>
		<reference ref_id="848014" ref_url="https://bugzilla.suse.com/848014" source="BUGZILLA"/>
		<reference ref_id="853048" ref_url="https://bugzilla.suse.com/853048" source="BUGZILLA"/>
		<reference ref_id="853049" ref_url="https://bugzilla.suse.com/853049" source="BUGZILLA"/>
		<reference ref_id="858311" ref_url="https://bugzilla.suse.com/858311" source="BUGZILLA"/>
		<reference ref_id="860092" ref_url="https://bugzilla.suse.com/860092" source="BUGZILLA"/>
		<reference ref_id="860163" ref_url="https://bugzilla.suse.com/860163" source="BUGZILLA"/>
		<reference ref_id="860165" ref_url="https://bugzilla.suse.com/860165" source="BUGZILLA"/>
		<reference ref_id="860300" ref_url="https://bugzilla.suse.com/860300" source="BUGZILLA"/>
		<reference ref_id="860302" ref_url="https://bugzilla.suse.com/860302" source="BUGZILLA"/>
		<reference ref_id="861256" ref_url="https://bugzilla.suse.com/861256" source="BUGZILLA"/>
		<reference ref_id="863297" ref_url="https://bugzilla.suse.com/863297" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2212" ref_url="https://www.suse.com/security/cve/CVE-2013-2212/" source="CVE"/>
		<reference ref_id="CVE-2013-6400" ref_url="https://www.suse.com/security/cve/CVE-2013-6400/" source="CVE"/>
		<reference ref_id="CVE-2013-6885" ref_url="https://www.suse.com/security/cve/CVE-2013-6885/" source="CVE"/>
		<reference ref_id="CVE-2014-1642" ref_url="https://www.suse.com/security/cve/CVE-2014-1642/" source="CVE"/>
		<reference ref_id="CVE-2014-1666" ref_url="https://www.suse.com/security/cve/CVE-2014-1666/" source="CVE"/>
		<reference ref_id="CVE-2014-1891" ref_url="https://www.suse.com/security/cve/CVE-2014-1891/" source="CVE"/>
		<reference ref_id="CVE-2014-1892" ref_url="https://www.suse.com/security/cve/CVE-2014-1892/" source="CVE"/>
		<reference ref_id="CVE-2014-1893" ref_url="https://www.suse.com/security/cve/CVE-2014-1893/" source="CVE"/>
		<reference ref_id="CVE-2014-1894" ref_url="https://www.suse.com/security/cve/CVE-2014-1894/" source="CVE"/>
		<reference ref_id="CVE-2014-1895" ref_url="https://www.suse.com/security/cve/CVE-2014-1895/" source="CVE"/>
		<reference ref_id="CVE-2014-1896" ref_url="https://www.suse.com/security/cve/CVE-2014-1896/" source="CVE"/>
		<reference ref_id="CVE-2014-1950" ref_url="https://www.suse.com/security/cve/CVE-2014-1950/" source="CVE"/>
		<description>

The SUSE Linux Enterprise Server 11 Service Pack 3 Xen hypervisor and 
toolset has been updated to 4.2.4 to fix various bugs and security issues:

The following security issues have been addressed:

    * 

      XSA-60: CVE-2013-2212: The vmx_set_uc_mode function in Xen 3.3
      through 4.3, when disabling chaches, allows local HVM guests with
      access to memory mapped I/O regions to cause a denial of service (CPU
      consumption and possibly hypervisor or guest kernel panic) via a
      crafted GFN range. (bnc#831120)

    * 

      XSA-80: CVE-2013-6400: Xen 4.2.x and 4.3.x, when using Intel VT-d and
      a PCI device has been assigned, does not clear the flag that
      suppresses IOMMU TLB flushes when unspecified errors occur, which
      causes the TLB entries to not be flushed and allows local guest
      administrators to cause a denial of service (host crash) or gain
      privileges via unspecified vectors. (bnc#853048)

    * 

      XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h through 0Fh
      processors does not properly handle the interaction between locked
      instructions and write-combined memory types, which allows local
      users to cause a denial of service (system hang) via a crafted
      application, aka the errata 793 issue. (bnc#853049)

    * 

      XSA-83: CVE-2014-1642: The IRQ setup in Xen 4.2.x and 4.3.x, when
      using device passthrough and configured to support a large number of
      CPUs, frees certain memory that may still be intended for use, which
      allows local guest administrators to cause a denial of service
      (memory corruption and hypervisor crash) and possibly execute
      arbitrary code via vectors related to an out-of-memory error that
      triggers a (1) use-after-free or (2) double free. (bnc#860092)

    * 

      XSA-84: CVE-2014-1891: The FLASK_{GET,SET}BOOL, FLASK_USER and
      FLASK_CONTEXT_TO_SID suboperations of the flask hypercall are
      vulnerable to an integer overflow on the input size. The hypercalls
      attempt to allocate a buffer which is 1 larger than this size and is
      therefore vulnerable to integer overflow and an attempt to allocate
      then access a zero byte buffer. (bnc#860163)

    * 

      XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through 4.1, while not
      affected by the above overflow, have a different overflow issue on
      FLASK_{GET,SET}BOOL and expose unreasonably large memory allocation
      to aribitrary guests. (bnc#860163)

    * 

      XSA-84: CVE-2014-1894: Xen 3.2 (and presumably earlier) exhibit both
      problems with the overflow issue being present for more than just the
      suboperations listed above. (bnc#860163)

    * 

      XSA-85: CVE-2014-1895: The FLASK_AVC_CACHESTAT hypercall, which
      provides access to per-cpu statistics on the Flask security policy,
      incorrectly validates the CPU for which statistics are being
      requested. (bnc#860165)

    * 

      XSA-86: CVE-2014-1896: libvchan (a library for inter-domain
      communication) does not correctly handle unusual or malicious
      contents in the xenstore ring. A malicious guest can exploit this to
      cause a libvchan-using facility to read or write past the end of the
      ring. (bnc#860300)

    * 

      XSA-87: CVE-2014-1666: The do_physdev_op function in Xen 4.1.5,
      4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict
      access to the (1) PHYSDEVOP_prepare_msix and (2)
      PHYSDEVOP_release_msix operations, which allows local PV guests to
      cause a denial of service (host or guest malfunction) or possibly
      gain privileges via unspecified vectors. (bnc#860302)

    * 

      XSA-88: CVE-2014-1950: Use-after-free vulnerability in the
      xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a
      multithreaded toolstack, does not properly handle a failure by the
      xc_cpumap_alloc function, which allows local users with access to
      management functions to cause a denial of service (heap corruption)
      and possibly gain privileges via unspecified vectors. (bnc#861256)

Also the following non-security bugs have been fixed:

    * Fixed boot problems with Xen kernel. '(XEN) setup 0000:00:18.0 for d0
      failed (-19)' (bnc#858311)
    * Fixed Xen hypervisor panic on 8-blades nPar with 46-bit memory
      addressing. (bnc#848014)
    * Fixed Xen hypervisor panic in HP's UEFI x86_64 platform and with xen
      environment, in booting stage. (bnc#833251)
    * xend/pvscsi: recognize also SCSI CDROM devices (bnc#863297)
    * pygrub: Support (/dev/xvda) style disk specifications

Security Issue references:

    * CVE-2013-2212
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212&gt;
    * CVE-2013-6400
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400&gt;
    * CVE-2013-6885
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885&gt;
    * CVE-2014-1642
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642&gt;
    * CVE-2014-1666
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666&gt;
    * CVE-2014-1891
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1891&gt;
    * CVE-2014-1892
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1892&gt;
    * CVE-2014-1893
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1893&gt;
    * CVE-2014-1894
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1894&gt;
    * CVE-2014-1895
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895&gt;
    * CVE-2014-1896
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896&gt;
    * CVE-2014-1950
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-02-27"/>
	<updated date="2014-02-27"/>
	<bugzilla href="https://bugzilla.suse.com/831120">SUSE bug 831120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833251">SUSE bug 833251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848014">SUSE bug 848014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853048">SUSE bug 853048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853049">SUSE bug 853049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858311">SUSE bug 858311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860092">SUSE bug 860092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860163">SUSE bug 860163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860165">SUSE bug 860165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860300">SUSE bug 860300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860302">SUSE bug 860302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861256">SUSE bug 861256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863297">SUSE bug 863297</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2212/">CVE-2013-2212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6400/">CVE-2013-6400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6885/">CVE-2013-6885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1642/">CVE-2014-1642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1666/">CVE-2014-1666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1891/">CVE-2014-1891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1892/">CVE-2014-1892</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1893/">CVE-2014-1893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1894/">CVE-2014-1894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1895/">CVE-2014-1895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1896/">CVE-2014-1896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1950/">CVE-2014-1950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567225" comment="xen-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567226" comment="xen-doc-html-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567227" comment="xen-doc-pdf-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567228" comment="xen-kmp-default-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567229" comment="xen-kmp-pae-4.2.4_02_3.0.101_0.15-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567230" comment="xen-libs-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567231" comment="xen-libs-32bit-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567232" comment="xen-tools-4.2.4_02-0.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567233" comment="xen-tools-domU-4.2.4_02-0.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78499" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="798770" ref_url="https://bugzilla.suse.com/798770" source="BUGZILLA"/>
		<reference ref_id="833483" ref_url="https://bugzilla.suse.com/833483" source="BUGZILLA"/>
		<reference ref_id="842006" ref_url="https://bugzilla.suse.com/842006" source="BUGZILLA"/>
		<reference ref_id="858178" ref_url="https://bugzilla.suse.com/858178" source="BUGZILLA"/>
		<reference ref_id="862608" ref_url="https://bugzilla.suse.com/862608" source="BUGZILLA"/>
		<reference ref_id="864801" ref_url="https://bugzilla.suse.com/864801" source="BUGZILLA"/>
		<reference ref_id="865682" ref_url="https://bugzilla.suse.com/865682" source="BUGZILLA"/>
		<reference ref_id="867910" ref_url="https://bugzilla.suse.com/867910" source="BUGZILLA"/>
		<reference ref_id="878841" ref_url="https://bugzilla.suse.com/878841" source="BUGZILLA"/>
		<reference ref_id="880751" ref_url="https://bugzilla.suse.com/880751" source="BUGZILLA"/>
		<reference ref_id="881900" ref_url="https://bugzilla.suse.com/881900" source="BUGZILLA"/>
		<reference ref_id="882092" ref_url="https://bugzilla.suse.com/882092" source="BUGZILLA"/>
		<reference ref_id="891539" ref_url="https://bugzilla.suse.com/891539" source="BUGZILLA"/>
		<reference ref_id="895798" ref_url="https://bugzilla.suse.com/895798" source="BUGZILLA"/>
		<reference ref_id="895799" ref_url="https://bugzilla.suse.com/895799" source="BUGZILLA"/>
		<reference ref_id="895802" ref_url="https://bugzilla.suse.com/895802" source="BUGZILLA"/>
		<reference ref_id="897657" ref_url="https://bugzilla.suse.com/897657" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4344" ref_url="https://www.suse.com/security/cve/CVE-2013-4344/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2014-2599" ref_url="https://www.suse.com/security/cve/CVE-2014-2599/" source="CVE"/>
		<reference ref_id="CVE-2014-3967" ref_url="https://www.suse.com/security/cve/CVE-2014-3967/" source="CVE"/>
		<reference ref_id="CVE-2014-3968" ref_url="https://www.suse.com/security/cve/CVE-2014-3968/" source="CVE"/>
		<reference ref_id="CVE-2014-4021" ref_url="https://www.suse.com/security/cve/CVE-2014-4021/" source="CVE"/>
		<reference ref_id="CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154/" source="CVE"/>
		<reference ref_id="CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155/" source="CVE"/>
		<reference ref_id="CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156/" source="CVE"/>
		<reference ref_id="CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 11 Service Pack 3 Xen package was updated to fix 
various bugs and security issues.

The following security issues have been fixed:

    * XSA-108: CVE-2014-7188: Improper MSR range used for x2APIC emulation
      (bnc#897657)
    * XSA-106: CVE-2014-7156: Missing privilege level checks in x86
      emulation of software interrupts (bnc#895802)
    * XSA-105: CVE-2014-7155: Missing privilege level checks in x86 HLT,
      LGDT, LIDT, and LMSW emulation (bnc#895799)
    * XSA-104: CVE-2014-7154: Race condition in HVMOP_track_dirty_vram
      (bnc#895798)
    * XSA-100: CVE-2014-4021: Hypervisor heap contents leaked to guests
      (bnc#880751)
    * XSA-96: CVE-2014-3967, CVE-2014-3968: Vulnerabilities in HVM MSI
      injection (bnc#878841)
    * XSA-89: CVE-2014-2599: HVMOP_set_mem_access is not preemptible
      (bnc#867910)
    * XSA-65: CVE-2013-4344: qemu SCSI REPORT LUNS buffer overflow
      (bnc#842006)
    * CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load
      (bnc#864801)

The following non-security issues have been fixed:

    * xend: Fix netif convertToDeviceNumber for running domains
      (bnc#891539)
    * Installing SLES12 as a VM on SLES11 SP3 fails because of btrfs in the
      VM (bnc#882092)
    * XEN kernel panic do_device_not_available() (bnc#881900)
    * Boot Failure with xen kernel in UEFI mode with error 'No memory for
      trampoline' (bnc#833483)
    * SLES 11 SP3 vm-install should get RHEL 7 support when released
      (bnc#862608)
    * SLES 11 SP3 XEN kiso version cause softlockup on 8 blades npar(480
      cpu) (bnc#858178)
    * Local attach support for PHY backends using scripts
      local_attach_support_for_phy.patch (bnc#865682)
    * Improve multipath support for npiv devices block-npiv (bnc#798770)

Security Issues:

    * CVE-2013-4344
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344&gt;
    * CVE-2013-4540
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540&gt;
    * CVE-2014-2599
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599&gt;
    * CVE-2014-3967
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3967&gt;
    * CVE-2014-3968
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3968&gt;
    * CVE-2014-4021
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021&gt;
    * CVE-2014-7154
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154&gt;
    * CVE-2014-7155
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155&gt;
    * CVE-2014-7156
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156&gt;
    * CVE-2014-7188
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-10-02"/>
	<updated date="2014-10-02"/>
	<bugzilla href="https://bugzilla.suse.com/798770">SUSE bug 798770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833483">SUSE bug 833483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842006">SUSE bug 842006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858178">SUSE bug 858178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862608">SUSE bug 862608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865682">SUSE bug 865682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867910">SUSE bug 867910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/878841">SUSE bug 878841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881900">SUSE bug 881900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882092">SUSE bug 882092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891539">SUSE bug 891539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4344/">CVE-2013-4344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2599/">CVE-2014-2599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3967/">CVE-2014-3967</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3968/">CVE-2014-3968</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4021/">CVE-2014-4021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567234" comment="xen-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567235" comment="xen-doc-html-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567236" comment="xen-doc-pdf-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567237" comment="xen-kmp-default-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567238" comment="xen-kmp-pae-4.2.4_04_3.0.101_0.40-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567239" comment="xen-libs-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567240" comment="xen-libs-32bit-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567241" comment="xen-tools-4.2.4_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567242" comment="xen-tools-domU-4.2.4_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78500" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="918995" ref_url="https://bugzilla.suse.com/918995" source="BUGZILLA"/>
		<reference ref_id="918998" ref_url="https://bugzilla.suse.com/918998" source="BUGZILLA"/>
		<reference ref_id="919341" ref_url="https://bugzilla.suse.com/919341" source="BUGZILLA"/>
		<reference ref_id="919464" ref_url="https://bugzilla.suse.com/919464" source="BUGZILLA"/>
		<reference ref_id="922705" ref_url="https://bugzilla.suse.com/922705" source="BUGZILLA"/>
		<reference ref_id="922706" ref_url="https://bugzilla.suse.com/922706" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2044" ref_url="https://www.suse.com/security/cve/CVE-2015-2044/" source="CVE"/>
		<reference ref_id="CVE-2015-2045" ref_url="https://www.suse.com/security/cve/CVE-2015-2045/" source="CVE"/>
		<reference ref_id="CVE-2015-2151" ref_url="https://www.suse.com/security/cve/CVE-2015-2151/" source="CVE"/>
		<reference ref_id="CVE-2015-2756" ref_url="https://www.suse.com/security/cve/CVE-2015-2756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001357.html" source="SUSE-SU"/>
		<description>

The Virtualization service XEN was updated to fix various bugs and security 
issues.

The following security issues have been fixed:

    * 

      CVE-2015-2756: XSA-126: Unmediated PCI command register access in
      qemu could have lead to denial of service attacks against the host,
      if PCI cards are passed through to guests.

    * 

      XSA-125: Long latency MMIO mapping operations were not preemptible.

    * 

      CVE-2015-2151: XSA-123: Instructions with register operands ignored
      eventual segment overrides encoded for them. Due to an insufficiently
      conditional assignment such a bogus segment override could have,
      however, corrupted a pointer used subsequently to store the result of
      the instruction.

    * 

      CVE-2015-2045: XSA-122: The code handling certain sub-operations of
      the HYPERVISOR_xen_version hypercall failed to fully initialize all
      fields of structures subsequently copied back to guest memory. Due to
      this hypervisor stack contents were copied into the destination of
      the operation, thus becoming visible to the guest.

    * 

      CVE-2015-2044: XSA-121: Emulation routines in the hypervisor dealing
      with certain system devices checked whether the access size by the
      guest is a supported one. When the access size is unsupported these
      routines failed to set the data to be returned to the guest for read
      accesses, so that hypervisor stack contents were copied into the
      destination of the operation, thus becoming visible to the guest.

Also fixed:

    * Fully virtualized guest install from network source failed with
      'cannot find guest domain' in XEN. (bsc#919341)

Security Issues:

    * CVE-2015-2044
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044&gt;
    * CVE-2015-2045
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045&gt;
    * CVE-2015-2151
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151&gt;
    * CVE-2015-2756
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-03-30"/>
	<updated date="2015-03-30"/>
	<bugzilla href="https://bugzilla.suse.com/918995">SUSE bug 918995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919341">SUSE bug 919341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919464">SUSE bug 919464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922705">SUSE bug 922705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922706">SUSE bug 922706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2044/">CVE-2015-2044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2045/">CVE-2015-2045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2151/">CVE-2015-2151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2756/">CVE-2015-2756</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567243" comment="xen-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567244" comment="xen-doc-html-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567245" comment="xen-doc-pdf-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567246" comment="xen-kmp-default-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567247" comment="xen-kmp-pae-4.2.5_04_3.0.101_0.47.52-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567248" comment="xen-libs-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567249" comment="xen-libs-32bit-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567250" comment="xen-tools-4.2.5_04-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567251" comment="xen-tools-domU-4.2.5_04-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78501" version="1" class="patch">
	<metadata>
		<title>Security update for Xen</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="931625" ref_url="https://bugzilla.suse.com/931625" source="BUGZILLA"/>
		<reference ref_id="931626" ref_url="https://bugzilla.suse.com/931626" source="BUGZILLA"/>
		<reference ref_id="931627" ref_url="https://bugzilla.suse.com/931627" source="BUGZILLA"/>
		<reference ref_id="931628" ref_url="https://bugzilla.suse.com/931628" source="BUGZILLA"/>
		<reference ref_id="932770" ref_url="https://bugzilla.suse.com/932770" source="BUGZILLA"/>
		<reference ref_id="932790" ref_url="https://bugzilla.suse.com/932790" source="BUGZILLA"/>
		<reference ref_id="932996" ref_url="https://bugzilla.suse.com/932996" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-4163" ref_url="https://www.suse.com/security/cve/CVE-2015-4163/" source="CVE"/>
		<reference ref_id="CVE-2015-4164" ref_url="https://www.suse.com/security/cve/CVE-2015-4164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<description>

Xen was updated to fix seven security vulnerabilities:

    * CVE-2015-4103: Potential unintended writes to host MSI message data
      field via qemu. (XSA-128, bnc#931625)
    * CVE-2015-4104: PCI MSI mask bits inadvertently exposed to guests.
      (XSA-129, bnc#931626)
    * CVE-2015-4105: Guest triggerable qemu MSI-X pass-through error
      messages. (XSA-130, bnc#931627)
    * CVE-2015-4106: Unmediated PCI register access in qemu. (XSA-131,
      bnc#931628)
    * CVE-2015-4163: GNTTABOP_swap_grant_ref operation misbehavior.
      (XSA-134, bnc#932790)
    * CVE-2015-3209: Heap overflow in qemu pcnet controller allowing guest
      to host escape. (XSA-135, bnc#932770)
    * CVE-2015-4164: DoS through iret hypercall handler. (XSA-136,
      bnc#932996)

Security Issues:

    * CVE-2015-4103
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103&gt;
    * CVE-2015-4104
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104&gt;
    * CVE-2015-4105
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105&gt;
    * CVE-2015-4106
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106&gt;
    * CVE-2015-4163
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163&gt;
    * CVE-2015-4164
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164&gt;
    * CVE-2015-3209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2015-06-05"/>
	<updated date="2015-06-05"/>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932790">SUSE bug 932790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932996">SUSE bug 932996</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4163/">CVE-2015-4163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4164/">CVE-2015-4164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567252" comment="xen-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567253" comment="xen-doc-html-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567254" comment="xen-doc-pdf-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567255" comment="xen-kmp-default-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567256" comment="xen-kmp-pae-4.2.5_08_3.0.101_0.47.55-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567257" comment="xen-libs-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567258" comment="xen-libs-32bit-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567259" comment="xen-tools-4.2.5_08-0.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567260" comment="xen-tools-domU-4.2.5_08-0.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78502" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issues:
      
- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception
- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)

- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)
- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)
- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-19"/>
	<updated date="2015-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567261" comment="xen-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567262" comment="xen-doc-html-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567263" comment="xen-doc-pdf-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567264" comment="xen-kmp-default-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567265" comment="xen-kmp-pae-4.2.5_18_3.0.101_0.47.71-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567266" comment="xen-libs-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567267" comment="xen-libs-32bit-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567268" comment="xen-tools-4.2.5_18-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567269" comment="xen-tools-domU-4.2.5_18-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78503" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="911866" ref_url="https://bugzilla.suse.com/911866" source="BUGZILLA"/>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
- Fix segfault during xfs_repair run (bsc#911866)
- Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911866">SUSE bug 911866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567270" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78504" version="1" class="patch">
	<metadata>
		<title>Security update for xinetd</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="762294" ref_url="https://bugzilla.suse.com/762294" source="BUGZILLA"/>
		<reference ref_id="844230" ref_url="https://bugzilla.suse.com/844230" source="BUGZILLA"/>
		<reference ref_id="855685" ref_url="https://bugzilla.suse.com/855685" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862/" source="CVE"/>
		<reference ref_id="CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342/" source="CVE"/>
		<description>

The multiplexing system xinetd was updated to fix security issues and a 
bug.

Security issues fixed:

    * CVE-2013-4342: xinetd ignores user and group directives for tcpmux
      services.
    * CVE-2012-0862: xinetd enables all services when tcp multiplexing is
      used.

Bug fixed:

    * Services started by xinetd were limited to 1024 open file
      descriptors. (bnc#855685)

Security Issues references:

    * CVE-2012-0862
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862&gt;
    * CVE-2013-4342
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-03-13"/>
	<updated date="2014-03-13"/>
	<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567271" comment="xinetd-2.3.14-130.133.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78505" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libs</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="857544" ref_url="https://bugzilla.suse.com/857544" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<description>

xorg-x11-libs was patched to fix the following security issues:

    * Integer overflow of allocations in font metadata file parsing.
      (CVE-2014-0209)
    * libxfont not validating length fields when parsing xfs protocol
      replies. (CVE-2014-0210)
    * Integer overflows causing miscalculating memory needs for xfs
      replies. (CVE-2014-0211)

Further information is available at 
http://lists.x.org/archives/xorg-announce/2014-May/002431.html
&lt;http://lists.x.org/archives/xorg-announce/2014-May/002431.html&gt; .

Security Issues references:

    * CVE-2014-0209
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209&gt;
    * CVE-2014-0210
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210&gt;
    * CVE-2014-0211
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2014-05-15"/>
	<updated date="2014-05-15"/>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567272" comment="xorg-x11-libs-7.4-8.26.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567273" comment="xorg-x11-libs-32bit-7.4-8.26.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78506" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821664" ref_url="https://bugzilla.suse.com/821664" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<description>

This update of xorg-x11-libX11 fixes several security issues.

Bug 815451/821664

CVE-2013-1981 CVE-2013-1997 CVE-2013-2004

Security Issues:

    * CVE-2013-1981
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981&gt;
    * CVE-2013-1997
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997&gt;
    * CVE-2013-2004
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566275" comment="xorg-x11-libX11-7.4-5.11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566276" comment="xorg-x11-libX11-32bit-7.4-5.11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78507" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-27"/>
	<updated date="2015-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567274" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567275" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78508" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXext</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821665" ref_url="https://bugzilla.suse.com/821665" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>

This update of xorg-x11-libXext fixes several integer overflow issues.

Bug 815451/821665 CVE-2013-1982

Security Issues:

    * CVE-2013-1982
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567276" comment="xorg-x11-libXext-7.4-1.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567277" comment="xorg-x11-libXext-32bit-7.4-1.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78509" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXfixes</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821667" ref_url="https://bugzilla.suse.com/821667" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>

This update of xorg-x11-libXfixes fixed a integer overflow issue.

Bug 815451/821667 CVE-2013-1983

Security Issues:

    * CVE-2013-1983
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567278" comment="xorg-x11-libXfixes-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567279" comment="xorg-x11-libXfixes-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78510" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXp</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821668" ref_url="https://bugzilla.suse.com/821668" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>

This update of xorg-x11-libXp fixes several integer overflow issues.

Bug 815451/821668 CVE-2013-2062

Security Issues:

    * CVE-2013-2062
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566284" comment="xorg-x11-libXp-7.4-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566285" comment="xorg-x11-libXp-32bit-7.4-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78511" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXrender</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821669" ref_url="https://bugzilla.suse.com/821669" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>

This update of xorg-x11-libXrender fixes several integer overflow issues.

Bug 815451/821669 CVE-2013-1987

Security Issues:

    * CVE-2013-1987
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567280" comment="xorg-x11-libXrender-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567281" comment="xorg-x11-libXrender-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78512" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXt</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821670" ref_url="https://bugzilla.suse.com/821670" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>

This update of xorg-x11-libXt fixes several integer and buffer overflow 
issues.

Bug 815451/821670 CVE-2013-2002/CVE-2013-2005

Security Issues:

    * CVE-2013-2002
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002&gt;
    * CVE-2013-2005
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567282" comment="xorg-x11-libXt-7.4-1.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567283" comment="xorg-x11-libXt-32bit-7.4-1.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78513" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libXv</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="815451" ref_url="https://bugzilla.suse.com/815451" source="BUGZILLA"/>
		<reference ref_id="821671" ref_url="https://bugzilla.suse.com/821671" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<description>

This update of xorg-x11-libXv fixes several integer and buffer overflow 
issues.

Bug 815451/821671 CVE-2013-1989/CVE-2013-2066

Security Issues:

    * CVE-2013-1989
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989&gt;
    * CVE-2013-2066
      &lt;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066&gt;

		</description>
<advisory from="security@suse.de">
	<issued date="2013-06-12"/>
	<updated date="2013-06-12"/>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567284" comment="xorg-x11-libXv-7.4-1.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567285" comment="xorg-x11-libXv-32bit-7.4-1.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78514" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP3</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<description>
The xscreensaver package was updated to fix the following security and non security issues:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
- Added xscreensaver-in_signal_handler_p.patch needed for fix of signal handling.
- Refresh xscreensaver-stars.patch.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp3</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077540" comment="SUSE Linux Enterprise Desktop 11 SP3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567286" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78515" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="940918" ref_url="https://bugzilla.suse.com/940918" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<description>

This security update (bsc#940918) fixes the following issues:
  * MFSA 2015-78 (CVE-2015-4495, bmo#1178058): Same origin violation
  * Remove PlayPreview registration from PDF Viewer (bmo#1179262)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566320" comment="MozillaFirefox-31.8.0esr-0.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566321" comment="MozillaFirefox-translations-31.8.0esr-0.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78516" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="959277" ref_url="https://bugzilla.suse.com/959277" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<description>

MozillaFirefox was updated to version 38.5.0 esr to fix the following issues: 

Following security issues were fixed:
* MFSA 2015-134/CVE-2015-7201/CVE-2015-7202
  Miscellaneous memory safety hazards (rv:43.0 / rv:38.5)
* MFSA 2015-138/CVE-2015-7210
  Use-after-free in WebRTC when datachannel is used after being
  destroyed
* MFSA 2015-139/CVE-2015-7212
  Integer overflow allocating extremely large textures
* MFSA 2015-145/CVE-2015-7205
  Underflow through code inspection
* MFSA 2015-146/CVE-2015-7213
  Integer overflow in MP4 playback in 64-bit versions
* MFSA 2015-147/CVE-2015-7222
  Integer underflow and buffer overflow processing MP4 metadata
  in libstagefright
* MFSA 2015-149/CVE-2015-7214
  Cross-site reading attack through data and view-source URIs
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-21"/>
	<updated date="2015-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566322" comment="MozillaFirefox-38.5.0esr-28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566323" comment="MozillaFirefox-translations-38.5.0esr-28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78517" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="967087" ref_url="https://bugzilla.suse.com/967087" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox fixes the following issues: 

- update to Firefox 38.6.1 ESR (bsc#967087)
  * MFSA 2016-14/CVE-2016-1523
    (bmo#1246093)
    Vulnerabilities in Graphite 2
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-24"/>
	<updated date="2016-02-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567287" comment="MozillaFirefox-38.6.1esr-34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567288" comment="MozillaFirefox-translations-38.6.1esr-34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78518" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="935033" ref_url="https://bugzilla.suse.com/935033" source="BUGZILLA"/>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<description>
MozillaFirefox, mozilla-nspr and mozilla-nss were updated to fix 17 security issues.

For more details please check the changelogs.

These security issues were fixed:
- CVE-2015-2724/CVE-2015-2725/CVE-2015-2726: Miscellaneous memory safety hazards (bsc#935979).
- CVE-2015-2728: Type confusion in Indexed Database Manager (bsc#935979).
- CVE-2015-2730: ECDSA signature validation fails to handle some signatures correctly (bsc#935979).
- CVE-2015-2722/CVE-2015-2733: Use-after-free in workers while using XMLHttpRequest (bsc#935979).
- CVE-2015-2734/CVE-2015-2735/CVE-2015-2736/CVE-2015-2737/CVE-2015-2738/CVE-2015-2739/CVE-2015-2740: Vulnerabilities found through code inspection (bsc#935979).
- CVE-2015-2743: Privilege escalation in PDF.js (bsc#935979).
- CVE-2015-4000: NSS accepts export-length DHE keys with regular DHE cipher suites (bsc#935033).
- CVE-2015-2721: NSS incorrectly permits skipping of ServerKeyExchange (bsc#935979).

This non-security issue was fixed:
- bsc#908275: Firefox did not print in landscape orientation.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-15"/>
	<updated date="2015-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566338" comment="MozillaFirefox-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566339" comment="MozillaFirefox-translations-31.8.0esr-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566340" comment="libfreebl3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566341" comment="libfreebl3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566342" comment="libsoftokn3-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566343" comment="libsoftokn3-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566344" comment="mozilla-nspr-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566345" comment="mozilla-nspr-32bit-4.10.8-0.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566346" comment="mozilla-nss-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566347" comment="mozilla-nss-32bit-3.19.2_CKBI_1.98-0.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566348" comment="mozilla-nss-tools-3.19.2_CKBI_1.98-0.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78519" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="969894" ref_url="https://bugzilla.suse.com/969894" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, mozilla-nspr, mozilla-nss fixes the following issues:

Mozilla Firefox was updated to 38.7.0 ESR (bsc#969894)
* MFSA 2016-16/CVE-2016-1952/CVE-2016-1953
  Miscellaneous memory safety hazards (rv:45.0 / rv:38.7)
* MFSA 2016-17/CVE-2016-1954
  Local file overwriting and potential privilege escalation
  through CSP reports
* MFSA 2016-20/CVE-2016-1957
  A memory leak in libstagefright when deleting an array during
  MP4 processing was fixed.
* MFSA 2016-21/CVE-2016-1958
  The displayed page address can be overridden
* MFSA 2016-23/CVE-2016-1960
  A use-after-free in HTML5 string parser was fixed.
* MFSA 2016-24/CVE-2016-1961
  A use-after-free in SetBody was fixed.
* MFSA 2016-25/CVE-2016-1962
  A use-after-free when using multiple WebRTC data channels was fixed.
* MFSA 2016-27/CVE-2016-1964
  A use-after-free during XML transformations was fixed.
* MFSA 2016-28/CVE-2016-1965
  Addressbar spoofing though history navigation and Location
  protocol property was fixed.
* MFSA 2016-31/CVE-2016-1966
  Memory corruption with malicious NPAPI plugin was fixed.
* MFSA 2016-34/CVE-2016-1974
  A out-of-bounds read in the HTML parser following a failed
  allocation was fixed.
* MFSA 2016-35/CVE-2016-1950
  A buffer overflow during ASN.1 decoding in NSS was fixed.
* MFSA 2016-37/CVE-2016-1977/CVE-2016-2790/CVE-2016-2791/
  CVE-2016-2792/CVE-2016-2793/CVE-2016-2794/CVE-2016-2795/
  CVE-2016-2796/CVE-2016-2797/CVE-2016-2798/CVE-2016-2799/
  CVE-2016-2800/CVE-2016-2801/CVE-2016-2802
  Various font vulnerabilities were fixed in the embedded Graphite 2 library

Mozilla NSS was updated to fix:
* MFSA 2016-15/CVE-2016-1978
  Use-after-free in NSS during SSL connections in low memory
* MFSA 2016-35/CVE-2016-1950
  Buffer overflow during ASN.1 decoding in NSS
* MFSA 2016-36/CVE-2016-1979
  Use-after-free during processing of DER encoded keys in NSS

Mozilla NSPR was updated to version 4.12 (bsc#969894)
* added a PR_GetEnvSecure function, which attempts to detect if
  the program is being executed with elevated privileges, and
  returns NULL if detected. It is recommended to use this function
  in general purpose library code.
* fixed a memory allocation bug related to the PR_*printf functions
* exported API PR_DuplicateEnvironment, which had already been
  added in NSPR 4.10.9
* added support for FreeBSD aarch64
* several minor correctness and compatibility fixes
* Enable atomic instructions on mips (bmo#1129878)
* Fix mips assertion failure when creating thread with custom
  stack size (bmo#1129968)

		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-15"/>
	<updated date="2016-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567289" comment="MozillaFirefox-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567290" comment="MozillaFirefox-translations-38.7.0esr-37.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567291" comment="libfreebl3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567292" comment="libfreebl3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567293" comment="libsoftokn3-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567294" comment="libsoftokn3-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567295" comment="mozilla-nspr-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567296" comment="mozilla-nspr-32bit-4.12-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567297" comment="mozilla-nss-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567298" comment="mozilla-nss-32bit-3.20.2-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567299" comment="mozilla-nss-tools-3.20.2-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78520" version="1" class="patch">
	<metadata>
		<title>security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="939709" ref_url="https://bugzilla.suse.com/939709" source="BUGZILLA"/>
		<reference ref_id="939712" ref_url="https://bugzilla.suse.com/939712" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165/" source="CVE"/>
		<reference ref_id="CVE-2015-5166" ref_url="https://www.suse.com/security/cve/CVE-2015-5166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<description>


This security update of Xen fixes the following issues:

* bsc#939712 (XSA-140): QEMU leak of uninitialized heap
  memory in rtl8139 device model (CVE-2015-5165)
* bsc#939709 (XSA-139):  Use after free in QEMU/Xen
  block unplug protocol (CVE-2015-5166)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-11"/>
	<updated date="2015-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939709">SUSE bug 939709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5166/">CVE-2015-5166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567300" comment="xen-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567301" comment="xen-doc-html-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567302" comment="xen-kmp-default-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567303" comment="xen-kmp-pae-4.4.2_12_3.0.101_63-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567304" comment="xen-libs-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567305" comment="xen-libs-32bit-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567306" comment="xen-tools-4.4.2_12-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567307" comment="xen-tools-domU-4.4.2_12-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78521" version="1" class="patch">
	<metadata>
		<title>Security update for augeas (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="925225" ref_url="https://bugzilla.suse.com/925225" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<description>

This update fixes an untrusted argument escaping problem (CVE-2014-8119):

* new API - aug_escape_name() - which can be used to escape
  untrusted inputs before using them as part of path expressions
* aug_match() is changed to return properly escaped output
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566351" comment="libaugeas0-0.9.0-3.17.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78522" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="939567" ref_url="https://bugzilla.suse.com/939567" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<description>
bind was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5477: Remote DoS via TKEY queries (bsc#939567)

Exposure to this issue can not be prevented by either ACLs or configuration options limiting or denying service because the exploitable code occurs early in the packet handling.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-28"/>
	<updated date="2015-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566356" comment="bind-libs-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566357" comment="bind-libs-32bit-9.9.6P1-0.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566358" comment="bind-utils-9.9.6P1-0.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78523" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="944066" ref_url="https://bugzilla.suse.com/944066" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<description>

The nameserver bind was updated to fix a remote denial of service (crash) attack against 
bind nameservers doing validation on DNSSEC signed records. (CVE-2015-5722, bsc#944066).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-02"/>
	<updated date="2015-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566359" comment="bind-libs-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566360" comment="bind-libs-32bit-9.9.6P1-0.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566361" comment="bind-utils-9.9.6P1-0.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78524" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="923281" ref_url="https://bugzilla.suse.com/923281" source="BUGZILLA"/>
		<reference ref_id="958861" ref_url="https://bugzilla.suse.com/958861" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<description>

 
This update fixes the following security issue:
- CVE-2015-8000: Fix remote denial of service by misparsing incoming responses (bsc#958861).

It also fixes a bug:
- Fix a regression in caching entries with a TTL of 0 (bsc#923281).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/923281">SUSE bug 923281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566362" comment="bind-libs-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566363" comment="bind-libs-32bit-9.9.6P1-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566364" comment="bind-utils-9.9.6P1-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78525" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="962189" ref_url="https://bugzilla.suse.com/962189" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

- CVE-2015-8704: Specific APL data allowed remote attacker to trigger a crash in certain configurations (bsc#962189)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-22"/>
	<updated date="2016-01-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566365" comment="bind-libs-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566366" comment="bind-libs-32bit-9.9.6P1-0.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566367" comment="bind-utils-9.9.6P1-0.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78526" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="970072" ref_url="https://bugzilla.suse.com/970072" source="BUGZILLA"/>
		<reference ref_id="970073" ref_url="https://bugzilla.suse.com/970073" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<description>

This update for bind fixes the following issues:

Fix two assertion failures that can lead to a remote denial of service attack:
* CVE-2016-1285: An error when parsing signature records for DNAME can lead to named exiting due to an assertion failure. (bsc#970072)
* CVE-2016-1286: An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. (bsc#970073)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-18"/>
	<updated date="2016-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567308" comment="bind-libs-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567309" comment="bind-libs-32bit-9.9.6P1-0.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567310" comment="bind-utils-9.9.6P1-0.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78527" version="1" class="patch">
	<metadata>
		<title>Security update for cabextract (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<description>

This security update fixes the following issues:

- Fix possible infinite loop caused DoS (bsc919283, CVE-2014-9556)
- Fix zero dereference (bsc#934524, CVE-2014-9732)
- Fix off by one (bsc#934527, CVE-2015-4470)
- Fix buffer under-read crash (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-27"/>
	<updated date="2015-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566370" comment="cabextract-1.2-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78528" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 

Security issue fixed:
- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

A non security issue fixed:
- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-10"/>
	<updated date="2015-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566373" comment="compat-openssl097g-0.9.7g-146.22.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566374" comment="compat-openssl097g-32bit-0.9.7g-146.22.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78529" version="1" class="patch">
	<metadata>
		<title>Security update for compat-openssl097g (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<description>

This update for compat-openssl097g fixes the following issues: 
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-02"/>
	<updated date="2016-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567311" comment="compat-openssl097g-0.9.7g-146.22.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567312" comment="compat-openssl097g-32bit-0.9.7g-146.22.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78530" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="926511" ref_url="https://bugzilla.suse.com/926511" source="BUGZILLA"/>
		<reference ref_id="962983" ref_url="https://bugzilla.suse.com/962983" source="BUGZILLA"/>
		<reference ref_id="962996" ref_url="https://bugzilla.suse.com/962996" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<description>

This update for curl fixes the following issues:

- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)

The following non-security bugs were fixed:

- bsc#926511: Check for errors on the control connection during FTP transfers

The following tracked bugs only affect the test suite:

- bsc#962996: Expired cookie in test 46 caused test failures
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926511">SUSE bug 926511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962996">SUSE bug 962996</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566387" comment="curl-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566388" comment="libcurl4-7.19.7-1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566389" comment="libcurl4-32bit-7.19.7-1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78531" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="880984" ref_url="https://bugzilla.suse.com/880984" source="BUGZILLA"/>
		<reference ref_id="919959" ref_url="https://bugzilla.suse.com/919959" source="BUGZILLA"/>
		<reference ref_id="926159" ref_url="https://bugzilla.suse.com/926159" source="BUGZILLA"/>
		<reference ref_id="928390" ref_url="https://bugzilla.suse.com/928390" source="BUGZILLA"/>
		<reference ref_id="936923" ref_url="https://bugzilla.suse.com/936923" source="BUGZILLA"/>
		<reference ref_id="947780" ref_url="https://bugzilla.suse.com/947780" source="BUGZILLA"/>
		<reference ref_id="961305" ref_url="https://bugzilla.suse.com/961305" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<description>

This update for dhcp fixes the following issues:

- CVE-2015-8605: A remote attacker could have used badly formed packets with an invalid IPv4 UDP length field to cause a DHCP server, client, or relay program to terminate abnormally (bsc#961305)

The following bugs were fixed:

- bsc#936923: Improper lease duration checking
- bsc#880984: Integer overflows in the date and time handling code
- bsc#947780: DHCP server could abort with 'Unable to set up timer: out of range' on very long or infinite timer intervals / lease lifetimes 
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
- bsc#928390: dhclient dit not expose next-server DHCPv4 option to script
- bsc#926159: DHCP preferrend and valid lifetime would be logged incorrectly
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/880984">SUSE bug 880984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919959">SUSE bug 919959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926159">SUSE bug 926159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928390">SUSE bug 928390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936923">SUSE bug 936923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947780">SUSE bug 947780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566396" comment="dhcp-4.2.4.P2-0.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566397" comment="dhcp-client-4.2.4.P2-0.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78532" version="1" class="patch">
	<metadata>
		<title>Security update for dhcpcd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="955762" ref_url="https://bugzilla.suse.com/955762" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-6698" ref_url="https://www.suse.com/security/cve/CVE-2012-6698/" source="CVE"/>
		<reference ref_id="CVE-2012-6699" ref_url="https://www.suse.com/security/cve/CVE-2012-6699/" source="CVE"/>
		<reference ref_id="CVE-2012-6700" ref_url="https://www.suse.com/security/cve/CVE-2012-6700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00002.html" source="SUSE-SU"/>
		<description>
dhcpcd was updated to fix three security issues.

These security issues were fixed:
- CVE-2012-6698: A potential out of bounds write was fixed, which could lead to memory corruption, triggerable by network local attackers.
- CVE-2012-6699: A loop error was fixed that could lead out of bound reads, triggerable by network local attackers.
- CVE-2012-6700: An incorrect free could lead to crashes, triggerable by network local attackers.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/955762">SUSE bug 955762</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6698/">CVE-2012-6698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6699/">CVE-2012-6699</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-6700/">CVE-2012-6700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566398" comment="dhcpcd-3.2.3-45.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78533" version="1" class="patch">
	<metadata>
		<title>Security update for ecryptfs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="920160" ref_url="https://bugzilla.suse.com/920160" source="BUGZILLA"/>
		<reference ref_id="962052" ref_url="https://bugzilla.suse.com/962052" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<description>

This update for ecryptfs-utils fixes the following issues:

- CVE-2016-1572: A local user could have escalated privileges by mounting over special filesystems (bsc#962052)
- CVE-2014-9687: A default salt value reduced complexity of offline precomputation attacks (bsc#920160)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-30"/>
	<updated date="2016-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566407" comment="ecryptfs-utils-61-1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566408" comment="ecryptfs-utils-32bit-61-1.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78534" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="775988" ref_url="https://bugzilla.suse.com/775988" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001966.html" source="SUSE-SU"/>
		<description>

This update for fetchmail fixes the following issues:

- CVE-2012-3482: A denial of service vulnerability in the base64 decoder during processing server NTLM protocol exchange was fixed (bsc#775988).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-24"/>
	<updated date="2016-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567313" comment="fetchmail-6.3.8.90-13.20.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78535" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/

The Mozilla NSPR library was updated to version 4.10.9, fixing various bugs.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-23"/>
	<updated date="2015-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566484" comment="mozilla-nspr-4.10.9-11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566485" comment="mozilla-nspr-32bit-4.10.9-11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78536" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="947003" ref_url="https://bugzilla.suse.com/947003" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox was updated to version 38.3.0 ESR (bsc#947003),
fixing bugs and security issues.

* MFSA 2015-96/CVE-2015-4500/CVE-2015-4501
  Miscellaneous memory safety hazards (rv:41.0 / rv:38.3)
* MFSA 2015-101/CVE-2015-4506
  Buffer overflow in libvpx while parsing vp9 format video
* MFSA 2015-105/CVE-2015-4511
  Buffer overflow while decoding WebM video
* MFSA 2015-106/CVE-2015-4509
  Use-after-free while manipulating HTML media content
* MFSA 2015-110/CVE-2015-4519
  Dragging and dropping images exposes final URL after
  redirects
* MFSA 2015-111/CVE-2015-4520
  Errors in the handling of CORS preflight request headers
* MFSA 2015-112/CVE-2015-4517/CVE-2015-4521/CVE-2015-4522
  CVE-2015-7174/CVE-2015-7175/CVE-2015-7176/CVE-2015-7177
  CVE-2015-7180
  Vulnerabilities found through code inspection

More details can be found on
        https://www.mozilla.org/en-US/security/advisories/
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566486" comment="MozillaFirefox-38.3.0esr-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566487" comment="MozillaFirefox-translations-38.3.0esr-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78537" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="908275" ref_url="https://bugzilla.suse.com/908275" source="BUGZILLA"/>
		<reference ref_id="952810" ref_url="https://bugzilla.suse.com/952810" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<description>

This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/908275">SUSE bug 908275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566488" comment="MozillaFirefox-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566489" comment="MozillaFirefox-branding-SLED-38-15.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566490" comment="MozillaFirefox-translations-38.4.0esr-25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566491" comment="libfreebl3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566492" comment="libfreebl3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566493" comment="libsoftokn3-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566494" comment="libsoftokn3-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566495" comment="mozilla-nspr-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566496" comment="mozilla-nspr-32bit-4.10.10-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566497" comment="mozilla-nss-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566498" comment="mozilla-nss-32bit-3.19.2.1-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566499" comment="mozilla-nss-tools-3.19.2.1-19.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78538" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="940806" ref_url="https://bugzilla.suse.com/940806" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<description>

Mozilla Firefox is being updated to the current Firefox 38ESR branch (specifically the 38.2.0ESR release).

Security issues fixed:
- MFSA 2015-78 / CVE-2015-4495: Same origin violation and local file stealing via PDF reader
- MFSA 2015-79 / CVE-2015-4473/CVE-2015-4474: Miscellaneous memory safety hazards (rv:40.0 / rv:38.2)
- MFSA 2015-80 / CVE-2015-4475: Out-of-bounds read with malformed MP3 file
- MFSA 2015-82 / CVE-2015-4478: Redefinition of non-configurable JavaScript object properties
- MFSA 2015-83 / CVE-2015-4479: Overflow issues in libstagefright
- MFSA 2015-87 / CVE-2015-4484: Crash when using shared memory in JavaScript
- MFSA 2015-88 / CVE-2015-4491: Heap overflow in gdk-pixbuf when scaling bitmap images
- MFSA 2015-89 / CVE-2015-4485/CVE-2015-4486: Buffer overflows on Libvpx when decoding WebM video
- MFSA 2015-90 / CVE-2015-4487/CVE-2015-4488/CVE-2015-4489: Vulnerabilities found through code inspection
- MFSA 2015-92 / CVE-2015-4492: Use-after-free in XMLHttpRequest with shared workers

This update also contains a lot of feature improvements and bug fixes from 31ESR to 38ESR.

Also the Mozilla NSS library switched its CKBI API from 1.98 to 2.4, which is what Firefox 38ESR uses.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-10"/>
	<updated date="2015-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566522" comment="MozillaFirefox-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566523" comment="MozillaFirefox-branding-SLED-31.0-0.12.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566524" comment="MozillaFirefox-translations-38.2.1esr-19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566525" comment="libfreebl3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566526" comment="libfreebl3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566527" comment="libsoftokn3-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566528" comment="libsoftokn3-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566529" comment="mozilla-nss-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566530" comment="mozilla-nss-32bit-3.19.2.0-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566531" comment="mozilla-nss-tools-3.19.2.0-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78539" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="937339" ref_url="https://bugzilla.suse.com/937339" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0578" ref_url="https://www.suse.com/security/cve/CVE-2014-0578/" source="CVE"/>
		<reference ref_id="CVE-2015-3114" ref_url="https://www.suse.com/security/cve/CVE-2015-3114/" source="CVE"/>
		<reference ref_id="CVE-2015-3115" ref_url="https://www.suse.com/security/cve/CVE-2015-3115/" source="CVE"/>
		<reference ref_id="CVE-2015-3116" ref_url="https://www.suse.com/security/cve/CVE-2015-3116/" source="CVE"/>
		<reference ref_id="CVE-2015-3117" ref_url="https://www.suse.com/security/cve/CVE-2015-3117/" source="CVE"/>
		<reference ref_id="CVE-2015-3118" ref_url="https://www.suse.com/security/cve/CVE-2015-3118/" source="CVE"/>
		<reference ref_id="CVE-2015-3119" ref_url="https://www.suse.com/security/cve/CVE-2015-3119/" source="CVE"/>
		<reference ref_id="CVE-2015-3120" ref_url="https://www.suse.com/security/cve/CVE-2015-3120/" source="CVE"/>
		<reference ref_id="CVE-2015-3121" ref_url="https://www.suse.com/security/cve/CVE-2015-3121/" source="CVE"/>
		<reference ref_id="CVE-2015-3122" ref_url="https://www.suse.com/security/cve/CVE-2015-3122/" source="CVE"/>
		<reference ref_id="CVE-2015-3123" ref_url="https://www.suse.com/security/cve/CVE-2015-3123/" source="CVE"/>
		<reference ref_id="CVE-2015-3124" ref_url="https://www.suse.com/security/cve/CVE-2015-3124/" source="CVE"/>
		<reference ref_id="CVE-2015-3125" ref_url="https://www.suse.com/security/cve/CVE-2015-3125/" source="CVE"/>
		<reference ref_id="CVE-2015-3126" ref_url="https://www.suse.com/security/cve/CVE-2015-3126/" source="CVE"/>
		<reference ref_id="CVE-2015-3127" ref_url="https://www.suse.com/security/cve/CVE-2015-3127/" source="CVE"/>
		<reference ref_id="CVE-2015-3128" ref_url="https://www.suse.com/security/cve/CVE-2015-3128/" source="CVE"/>
		<reference ref_id="CVE-2015-3129" ref_url="https://www.suse.com/security/cve/CVE-2015-3129/" source="CVE"/>
		<reference ref_id="CVE-2015-3130" ref_url="https://www.suse.com/security/cve/CVE-2015-3130/" source="CVE"/>
		<reference ref_id="CVE-2015-3131" ref_url="https://www.suse.com/security/cve/CVE-2015-3131/" source="CVE"/>
		<reference ref_id="CVE-2015-3132" ref_url="https://www.suse.com/security/cve/CVE-2015-3132/" source="CVE"/>
		<reference ref_id="CVE-2015-3133" ref_url="https://www.suse.com/security/cve/CVE-2015-3133/" source="CVE"/>
		<reference ref_id="CVE-2015-3134" ref_url="https://www.suse.com/security/cve/CVE-2015-3134/" source="CVE"/>
		<reference ref_id="CVE-2015-3135" ref_url="https://www.suse.com/security/cve/CVE-2015-3135/" source="CVE"/>
		<reference ref_id="CVE-2015-3136" ref_url="https://www.suse.com/security/cve/CVE-2015-3136/" source="CVE"/>
		<reference ref_id="CVE-2015-3137" ref_url="https://www.suse.com/security/cve/CVE-2015-3137/" source="CVE"/>
		<reference ref_id="CVE-2015-4428" ref_url="https://www.suse.com/security/cve/CVE-2015-4428/" source="CVE"/>
		<reference ref_id="CVE-2015-4429" ref_url="https://www.suse.com/security/cve/CVE-2015-4429/" source="CVE"/>
		<reference ref_id="CVE-2015-4430" ref_url="https://www.suse.com/security/cve/CVE-2015-4430/" source="CVE"/>
		<reference ref_id="CVE-2015-4431" ref_url="https://www.suse.com/security/cve/CVE-2015-4431/" source="CVE"/>
		<reference ref_id="CVE-2015-4432" ref_url="https://www.suse.com/security/cve/CVE-2015-4432/" source="CVE"/>
		<reference ref_id="CVE-2015-4433" ref_url="https://www.suse.com/security/cve/CVE-2015-4433/" source="CVE"/>
		<reference ref_id="CVE-2015-5116" ref_url="https://www.suse.com/security/cve/CVE-2015-5116/" source="CVE"/>
		<reference ref_id="CVE-2015-5117" ref_url="https://www.suse.com/security/cve/CVE-2015-5117/" source="CVE"/>
		<reference ref_id="CVE-2015-5118" ref_url="https://www.suse.com/security/cve/CVE-2015-5118/" source="CVE"/>
		<reference ref_id="CVE-2015-5119" ref_url="https://www.suse.com/security/cve/CVE-2015-5119/" source="CVE"/>
		<description>
flash-player was updated to fix 35 security issues.

These security issues were fixed:
- CVE-2015-3135, CVE-2015-4432, CVE-2015-5118: Heap buffer overflow vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, CVE-2015-4431: Memory corruption vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3126, CVE-2015-4429: Null pointer dereference issues (bsc#937339).
- CVE-2015-3114: A security bypass vulnerability that could lead to information disclosure (bsc#937339).
- CVE-2015-3119, CVE-2015-3120, CVE-2015-3121, CVE-2015-3122, CVE-2015-4433: Type confusion vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2015-3118, CVE-2015-3124, CVE-2015-5117, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, CVE-2015-5119: Use-after-free vulnerabilities that could lead to code execution (bsc#937339).
- CVE-2014-0578, CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116: Vulnerabilities that could be exploited to bypass the same-origin-policy and lead to information disclosure (bsc#937339).
 		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-09"/>
	<updated date="2015-07-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/937339">SUSE bug 937339</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0578/">CVE-2014-0578</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3114/">CVE-2015-3114</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3115/">CVE-2015-3115</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3116/">CVE-2015-3116</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3117/">CVE-2015-3117</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3118/">CVE-2015-3118</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3119/">CVE-2015-3119</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3120/">CVE-2015-3120</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3121/">CVE-2015-3121</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3122/">CVE-2015-3122</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3123/">CVE-2015-3123</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3124/">CVE-2015-3124</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3125/">CVE-2015-3125</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3126/">CVE-2015-3126</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3127/">CVE-2015-3127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3128/">CVE-2015-3128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3129/">CVE-2015-3129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3130/">CVE-2015-3130</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3131/">CVE-2015-3131</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3132/">CVE-2015-3132</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3133/">CVE-2015-3133</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3134/">CVE-2015-3134</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3135/">CVE-2015-3135</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3136/">CVE-2015-3136</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-3137/">CVE-2015-3137</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4428/">CVE-2015-4428</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4429/">CVE-2015-4429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4430/">CVE-2015-4430</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4431/">CVE-2015-4431</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4432/">CVE-2015-4432</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4433/">CVE-2015-4433</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5116/">CVE-2015-5116</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5117/">CVE-2015-5117</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5118/">CVE-2015-5118</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5119/">CVE-2015-5119</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566538" comment="flash-player-11.2.202.481-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566539" comment="flash-player-gnome-11.2.202.481-0.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566540" comment="flash-player-kde4-11.2.202.481-0.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78540" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="937752" ref_url="https://bugzilla.suse.com/937752" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5122" ref_url="https://www.suse.com/security/cve/CVE-2015-5122/" source="CVE"/>
		<reference ref_id="CVE-2015-5123" ref_url="https://www.suse.com/security/cve/CVE-2015-5123/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-5123: Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function (bsc#937752).
- CVE-2015-5122: Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allowed remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property (bsc#937752).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-16"/>
	<updated date="2015-07-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/937752">SUSE bug 937752</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5122/">CVE-2015-5122</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5123/">CVE-2015-5123</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566541" comment="flash-player-11.2.202.491-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566542" comment="flash-player-gnome-11.2.202.491-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566543" comment="flash-player-kde4-11.2.202.491-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78541" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="941239" ref_url="https://bugzilla.suse.com/941239" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3107" ref_url="https://www.suse.com/security/cve/CVE-2015-3107/" source="CVE"/>
		<reference ref_id="CVE-2015-5124" ref_url="https://www.suse.com/security/cve/CVE-2015-5124/" source="CVE"/>
		<reference ref_id="CVE-2015-5125" ref_url="https://www.suse.com/security/cve/CVE-2015-5125/" source="CVE"/>
		<reference ref_id="CVE-2015-5127" ref_url="https://www.suse.com/security/cve/CVE-2015-5127/" source="CVE"/>
		<reference ref_id="CVE-2015-5128" ref_url="https://www.suse.com/security/cve/CVE-2015-5128/" source="CVE"/>
		<reference ref_id="CVE-2015-5129" ref_url="https://www.suse.com/security/cve/CVE-2015-5129/" source="CVE"/>
		<reference ref_id="CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130/" source="CVE"/>
		<reference ref_id="CVE-2015-5131" ref_url="https://www.suse.com/security/cve/CVE-2015-5131/" source="CVE"/>
		<reference ref_id="CVE-2015-5132" ref_url="https://www.suse.com/security/cve/CVE-2015-5132/" source="CVE"/>
		<reference ref_id="CVE-2015-5133" ref_url="https://www.suse.com/security/cve/CVE-2015-5133/" source="CVE"/>
		<reference ref_id="CVE-2015-5134" ref_url="https://www.suse.com/security/cve/CVE-2015-5134/" source="CVE"/>
		<reference ref_id="CVE-2015-5539" ref_url="https://www.suse.com/security/cve/CVE-2015-5539/" source="CVE"/>
		<reference ref_id="CVE-2015-5540" ref_url="https://www.suse.com/security/cve/CVE-2015-5540/" source="CVE"/>
		<reference ref_id="CVE-2015-5541" ref_url="https://www.suse.com/security/cve/CVE-2015-5541/" source="CVE"/>
		<reference ref_id="CVE-2015-5544" ref_url="https://www.suse.com/security/cve/CVE-2015-5544/" source="CVE"/>
		<reference ref_id="CVE-2015-5545" ref_url="https://www.suse.com/security/cve/CVE-2015-5545/" source="CVE"/>
		<reference ref_id="CVE-2015-5546" ref_url="https://www.suse.com/security/cve/CVE-2015-5546/" source="CVE"/>
		<reference ref_id="CVE-2015-5547" ref_url="https://www.suse.com/security/cve/CVE-2015-5547/" source="CVE"/>
		<reference ref_id="CVE-2015-5548" ref_url="https://www.suse.com/security/cve/CVE-2015-5548/" source="CVE"/>
		<reference ref_id="CVE-2015-5549" ref_url="https://www.suse.com/security/cve/CVE-2015-5549/" source="CVE"/>
		<reference ref_id="CVE-2015-5550" ref_url="https://www.suse.com/security/cve/CVE-2015-5550/" source="CVE"/>
		<reference ref_id="CVE-2015-5551" ref_url="https://www.suse.com/security/cve/CVE-2015-5551/" source="CVE"/>
		<reference ref_id="CVE-2015-5552" ref_url="https://www.suse.com/security/cve/CVE-2015-5552/" source="CVE"/>
		<reference ref_id="CVE-2015-5553" ref_url="https://www.suse.com/security/cve/CVE-2015-5553/" source="CVE"/>
		<reference ref_id="CVE-2015-5554" ref_url="https://www.suse.com/security/cve/CVE-2015-5554/" source="CVE"/>
		<reference ref_id="CVE-2015-5555" ref_url="https://www.suse.com/security/cve/CVE-2015-5555/" source="CVE"/>
		<reference ref_id="CVE-2015-5556" ref_url="https://www.suse.com/security/cve/CVE-2015-5556/" source="CVE"/>
		<reference ref_id="CVE-2015-5557" ref_url="https://www.suse.com/security/cve/CVE-2015-5557/" source="CVE"/>
		<reference ref_id="CVE-2015-5558" ref_url="https://www.suse.com/security/cve/CVE-2015-5558/" source="CVE"/>
		<reference ref_id="CVE-2015-5559" ref_url="https://www.suse.com/security/cve/CVE-2015-5559/" source="CVE"/>
		<reference ref_id="CVE-2015-5560" ref_url="https://www.suse.com/security/cve/CVE-2015-5560/" source="CVE"/>
		<reference ref_id="CVE-2015-5561" ref_url="https://www.suse.com/security/cve/CVE-2015-5561/" source="CVE"/>
		<reference ref_id="CVE-2015-5562" ref_url="https://www.suse.com/security/cve/CVE-2015-5562/" source="CVE"/>
		<reference ref_id="CVE-2015-5563" ref_url="https://www.suse.com/security/cve/CVE-2015-5563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<description>


This security update to 11.2.202.508 (bsc#941239) fixes the
following issues:

  * APSB15-19: CVE-2015-3107, CVE-2015-5124, CVE-2015-5125,
    CVE-2015-5127, CVE-2015-5128, CVE-2015-5129, CVE-2015-5130,
    CVE-2015-5131, CVE-2015-5132, CVE-2015-5133, CVE-2015-5134,
    CVE-2015-5539, CVE-2015-5540, CVE-2015-5541, CVE-2015-5544,
    CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548,
    CVE-2015-5549, CVE-2015-5550, CVE-2015-5551, CVE-2015-5552,
    CVE-2015-5553, CVE-2015-5554, CVE-2015-5555, CVE-2015-5556,
    CVE-2015-5557, CVE-2015-5558, CVE-2015-5559, CVE-2015-5560,
    CVE-2015-5561, CVE-2015-5562, CVE-2015-5563
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3107/">CVE-2015-3107</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-5124/">CVE-2015-5124</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5125/">CVE-2015-5125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5127/">CVE-2015-5127</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5128/">CVE-2015-5128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5129/">CVE-2015-5129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5131/">CVE-2015-5131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5132/">CVE-2015-5132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5133/">CVE-2015-5133</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5134/">CVE-2015-5134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5539/">CVE-2015-5539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5540/">CVE-2015-5540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5541/">CVE-2015-5541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5544/">CVE-2015-5544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5545/">CVE-2015-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5546/">CVE-2015-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5547/">CVE-2015-5547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5548/">CVE-2015-5548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5549/">CVE-2015-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5550/">CVE-2015-5550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5551/">CVE-2015-5551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5552/">CVE-2015-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5553/">CVE-2015-5553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5554/">CVE-2015-5554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5555/">CVE-2015-5555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5556/">CVE-2015-5556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5557/">CVE-2015-5557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5558/">CVE-2015-5558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5559/">CVE-2015-5559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5560/">CVE-2015-5560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5561/">CVE-2015-5561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5562/">CVE-2015-5562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5563/">CVE-2015-5563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566544" comment="flash-player-11.2.202.508-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566545" comment="flash-player-gnome-11.2.202.508-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566546" comment="flash-player-kde4-11.2.202.508-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78542" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="946880" ref_url="https://bugzilla.suse.com/946880" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5567" ref_url="https://www.suse.com/security/cve/CVE-2015-5567/" source="CVE"/>
		<reference ref_id="CVE-2015-5568" ref_url="https://www.suse.com/security/cve/CVE-2015-5568/" source="CVE"/>
		<reference ref_id="CVE-2015-5570" ref_url="https://www.suse.com/security/cve/CVE-2015-5570/" source="CVE"/>
		<reference ref_id="CVE-2015-5571" ref_url="https://www.suse.com/security/cve/CVE-2015-5571/" source="CVE"/>
		<reference ref_id="CVE-2015-5572" ref_url="https://www.suse.com/security/cve/CVE-2015-5572/" source="CVE"/>
		<reference ref_id="CVE-2015-5573" ref_url="https://www.suse.com/security/cve/CVE-2015-5573/" source="CVE"/>
		<reference ref_id="CVE-2015-5574" ref_url="https://www.suse.com/security/cve/CVE-2015-5574/" source="CVE"/>
		<reference ref_id="CVE-2015-5575" ref_url="https://www.suse.com/security/cve/CVE-2015-5575/" source="CVE"/>
		<reference ref_id="CVE-2015-5576" ref_url="https://www.suse.com/security/cve/CVE-2015-5576/" source="CVE"/>
		<reference ref_id="CVE-2015-5577" ref_url="https://www.suse.com/security/cve/CVE-2015-5577/" source="CVE"/>
		<reference ref_id="CVE-2015-5578" ref_url="https://www.suse.com/security/cve/CVE-2015-5578/" source="CVE"/>
		<reference ref_id="CVE-2015-5579" ref_url="https://www.suse.com/security/cve/CVE-2015-5579/" source="CVE"/>
		<reference ref_id="CVE-2015-5580" ref_url="https://www.suse.com/security/cve/CVE-2015-5580/" source="CVE"/>
		<reference ref_id="CVE-2015-5581" ref_url="https://www.suse.com/security/cve/CVE-2015-5581/" source="CVE"/>
		<reference ref_id="CVE-2015-5582" ref_url="https://www.suse.com/security/cve/CVE-2015-5582/" source="CVE"/>
		<reference ref_id="CVE-2015-5584" ref_url="https://www.suse.com/security/cve/CVE-2015-5584/" source="CVE"/>
		<reference ref_id="CVE-2015-5587" ref_url="https://www.suse.com/security/cve/CVE-2015-5587/" source="CVE"/>
		<reference ref_id="CVE-2015-5588" ref_url="https://www.suse.com/security/cve/CVE-2015-5588/" source="CVE"/>
		<reference ref_id="CVE-2015-6676" ref_url="https://www.suse.com/security/cve/CVE-2015-6676/" source="CVE"/>
		<reference ref_id="CVE-2015-6677" ref_url="https://www.suse.com/security/cve/CVE-2015-6677/" source="CVE"/>
		<reference ref_id="CVE-2015-6678" ref_url="https://www.suse.com/security/cve/CVE-2015-6678/" source="CVE"/>
		<reference ref_id="CVE-2015-6679" ref_url="https://www.suse.com/security/cve/CVE-2015-6679/" source="CVE"/>
		<reference ref_id="CVE-2015-6682" ref_url="https://www.suse.com/security/cve/CVE-2015-6682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00022.html" source="SUSE-SU"/>
		<description>

Adobe Flash Player was updated to 11.2.202.521 (APSB15-23 bsc#946880) fixing several security issues:

More information can be found on:

  https://helpx.adobe.com/security/products/flash-player/apsb15-23.html

		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/946880">SUSE bug 946880</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5567/">CVE-2015-5567</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5568/">CVE-2015-5568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5570/">CVE-2015-5570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5571/">CVE-2015-5571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5572/">CVE-2015-5572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5573/">CVE-2015-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5574/">CVE-2015-5574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5575/">CVE-2015-5575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5576/">CVE-2015-5576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5577/">CVE-2015-5577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5578/">CVE-2015-5578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5579/">CVE-2015-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5580/">CVE-2015-5580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5581/">CVE-2015-5581</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5582/">CVE-2015-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5584/">CVE-2015-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5587/">CVE-2015-5587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5588/">CVE-2015-5588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6676/">CVE-2015-6676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6677/">CVE-2015-6677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6678/">CVE-2015-6678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6679/">CVE-2015-6679</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6682/">CVE-2015-6682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566547" comment="flash-player-11.2.202.521-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566548" comment="flash-player-gnome-11.2.202.521-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566549" comment="flash-player-kde4-11.2.202.521-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78543" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="950169" ref_url="https://bugzilla.suse.com/950169" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5569" ref_url="https://www.suse.com/security/cve/CVE-2015-5569/" source="CVE"/>
		<reference ref_id="CVE-2015-7625" ref_url="https://www.suse.com/security/cve/CVE-2015-7625/" source="CVE"/>
		<reference ref_id="CVE-2015-7626" ref_url="https://www.suse.com/security/cve/CVE-2015-7626/" source="CVE"/>
		<reference ref_id="CVE-2015-7627" ref_url="https://www.suse.com/security/cve/CVE-2015-7627/" source="CVE"/>
		<reference ref_id="CVE-2015-7628" ref_url="https://www.suse.com/security/cve/CVE-2015-7628/" source="CVE"/>
		<reference ref_id="CVE-2015-7629" ref_url="https://www.suse.com/security/cve/CVE-2015-7629/" source="CVE"/>
		<reference ref_id="CVE-2015-7630" ref_url="https://www.suse.com/security/cve/CVE-2015-7630/" source="CVE"/>
		<reference ref_id="CVE-2015-7631" ref_url="https://www.suse.com/security/cve/CVE-2015-7631/" source="CVE"/>
		<reference ref_id="CVE-2015-7632" ref_url="https://www.suse.com/security/cve/CVE-2015-7632/" source="CVE"/>
		<reference ref_id="CVE-2015-7633" ref_url="https://www.suse.com/security/cve/CVE-2015-7633/" source="CVE"/>
		<reference ref_id="CVE-2015-7634" ref_url="https://www.suse.com/security/cve/CVE-2015-7634/" source="CVE"/>
		<reference ref_id="CVE-2015-7643" ref_url="https://www.suse.com/security/cve/CVE-2015-7643/" source="CVE"/>
		<reference ref_id="CVE-2015-7644" ref_url="https://www.suse.com/security/cve/CVE-2015-7644/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html" source="SUSE-SU"/>
		<description>
flash-player was updated to version 11.2.202.535 to fix 13 security issues (bsc#950169).

These security issues were fixed:
- A vulnerability that could be exploited to bypass the same-origin-policy and lead to information disclosure (CVE-2015-7628).
- A defense-in-depth feature in the Flash broker API (CVE-2015-5569).
- Use-after-free vulnerabilities that could lead to code execution (CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644).
- A buffer overflow vulnerability that could lead to code execution (CVE-2015-7632).
- Memory corruption vulnerabilities that could lead to code execution (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, CVE-2015-7634).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-14"/>
	<updated date="2015-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/950169">SUSE bug 950169</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5569/">CVE-2015-5569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7625/">CVE-2015-7625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7626/">CVE-2015-7626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7627/">CVE-2015-7627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7628/">CVE-2015-7628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7629/">CVE-2015-7629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7630/">CVE-2015-7630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7631/">CVE-2015-7631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7632/">CVE-2015-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7633/">CVE-2015-7633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7634/">CVE-2015-7634</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7643/">CVE-2015-7643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7644/">CVE-2015-7644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566550" comment="flash-player-11.2.202.535-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566551" comment="flash-player-gnome-11.2.202.535-0.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566552" comment="flash-player-kde4-11.2.202.535-0.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78544" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="950474" ref_url="https://bugzilla.suse.com/950474" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7645" ref_url="https://www.suse.com/security/cve/CVE-2015-7645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00017.html" source="SUSE-SU"/>
		<description>
flash-player was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-7645: Critical vulnerability affecting 11.2.202.535 used in Pawn Storm (APSA15-05) (bsc#950474).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-16"/>
	<updated date="2015-10-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/950474">SUSE bug 950474</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7645/">CVE-2015-7645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566553" comment="flash-player-11.2.202.540-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566554" comment="flash-player-gnome-11.2.202.540-0.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566555" comment="flash-player-kde4-11.2.202.540-0.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78545" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="954512" ref_url="https://bugzilla.suse.com/954512" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7651" ref_url="https://www.suse.com/security/cve/CVE-2015-7651/" source="CVE"/>
		<reference ref_id="CVE-2015-7652" ref_url="https://www.suse.com/security/cve/CVE-2015-7652/" source="CVE"/>
		<reference ref_id="CVE-2015-7653" ref_url="https://www.suse.com/security/cve/CVE-2015-7653/" source="CVE"/>
		<reference ref_id="CVE-2015-7654" ref_url="https://www.suse.com/security/cve/CVE-2015-7654/" source="CVE"/>
		<reference ref_id="CVE-2015-7655" ref_url="https://www.suse.com/security/cve/CVE-2015-7655/" source="CVE"/>
		<reference ref_id="CVE-2015-7656" ref_url="https://www.suse.com/security/cve/CVE-2015-7656/" source="CVE"/>
		<reference ref_id="CVE-2015-7657" ref_url="https://www.suse.com/security/cve/CVE-2015-7657/" source="CVE"/>
		<reference ref_id="CVE-2015-7658" ref_url="https://www.suse.com/security/cve/CVE-2015-7658/" source="CVE"/>
		<reference ref_id="CVE-2015-7659" ref_url="https://www.suse.com/security/cve/CVE-2015-7659/" source="CVE"/>
		<reference ref_id="CVE-2015-7660" ref_url="https://www.suse.com/security/cve/CVE-2015-7660/" source="CVE"/>
		<reference ref_id="CVE-2015-7661" ref_url="https://www.suse.com/security/cve/CVE-2015-7661/" source="CVE"/>
		<reference ref_id="CVE-2015-7662" ref_url="https://www.suse.com/security/cve/CVE-2015-7662/" source="CVE"/>
		<reference ref_id="CVE-2015-7663" ref_url="https://www.suse.com/security/cve/CVE-2015-7663/" source="CVE"/>
		<reference ref_id="CVE-2015-8042" ref_url="https://www.suse.com/security/cve/CVE-2015-8042/" source="CVE"/>
		<reference ref_id="CVE-2015-8043" ref_url="https://www.suse.com/security/cve/CVE-2015-8043/" source="CVE"/>
		<reference ref_id="CVE-2015-8044" ref_url="https://www.suse.com/security/cve/CVE-2015-8044/" source="CVE"/>
		<reference ref_id="CVE-2015-8046" ref_url="https://www.suse.com/security/cve/CVE-2015-8046/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001674.html" source="SUSE-SU"/>
		<description>
The flash-player package was updated to fix the following security issues:

- Security update to 11.2.202.548 (bsc#954512):
  * APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,
    CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,
    CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,
    CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,
    CVE-2015-8044, CVE-2015-8046
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-11"/>
	<updated date="2015-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954512">SUSE bug 954512</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7651/">CVE-2015-7651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7652/">CVE-2015-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7653/">CVE-2015-7653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7654/">CVE-2015-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7655/">CVE-2015-7655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7656/">CVE-2015-7656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7657/">CVE-2015-7657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7658/">CVE-2015-7658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7659/">CVE-2015-7659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7660/">CVE-2015-7660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7661/">CVE-2015-7661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7662/">CVE-2015-7662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7663/">CVE-2015-7663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8042/">CVE-2015-8042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8043/">CVE-2015-8043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8044/">CVE-2015-8044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8046/">CVE-2015-8046</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566556" comment="flash-player-11.2.202.548-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566557" comment="flash-player-gnome-11.2.202.548-0.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566558" comment="flash-player-kde4-11.2.202.548-0.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78546" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="958324" ref_url="https://bugzilla.suse.com/958324" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8045" ref_url="https://www.suse.com/security/cve/CVE-2015-8045/" source="CVE"/>
		<reference ref_id="CVE-2015-8047" ref_url="https://www.suse.com/security/cve/CVE-2015-8047/" source="CVE"/>
		<reference ref_id="CVE-2015-8048" ref_url="https://www.suse.com/security/cve/CVE-2015-8048/" source="CVE"/>
		<reference ref_id="CVE-2015-8049" ref_url="https://www.suse.com/security/cve/CVE-2015-8049/" source="CVE"/>
		<reference ref_id="CVE-2015-8050" ref_url="https://www.suse.com/security/cve/CVE-2015-8050/" source="CVE"/>
		<reference ref_id="CVE-2015-8055" ref_url="https://www.suse.com/security/cve/CVE-2015-8055/" source="CVE"/>
		<reference ref_id="CVE-2015-8056" ref_url="https://www.suse.com/security/cve/CVE-2015-8056/" source="CVE"/>
		<reference ref_id="CVE-2015-8057" ref_url="https://www.suse.com/security/cve/CVE-2015-8057/" source="CVE"/>
		<reference ref_id="CVE-2015-8058" ref_url="https://www.suse.com/security/cve/CVE-2015-8058/" source="CVE"/>
		<reference ref_id="CVE-2015-8059" ref_url="https://www.suse.com/security/cve/CVE-2015-8059/" source="CVE"/>
		<reference ref_id="CVE-2015-8060" ref_url="https://www.suse.com/security/cve/CVE-2015-8060/" source="CVE"/>
		<reference ref_id="CVE-2015-8061" ref_url="https://www.suse.com/security/cve/CVE-2015-8061/" source="CVE"/>
		<reference ref_id="CVE-2015-8062" ref_url="https://www.suse.com/security/cve/CVE-2015-8062/" source="CVE"/>
		<reference ref_id="CVE-2015-8063" ref_url="https://www.suse.com/security/cve/CVE-2015-8063/" source="CVE"/>
		<reference ref_id="CVE-2015-8064" ref_url="https://www.suse.com/security/cve/CVE-2015-8064/" source="CVE"/>
		<reference ref_id="CVE-2015-8065" ref_url="https://www.suse.com/security/cve/CVE-2015-8065/" source="CVE"/>
		<reference ref_id="CVE-2015-8066" ref_url="https://www.suse.com/security/cve/CVE-2015-8066/" source="CVE"/>
		<reference ref_id="CVE-2015-8067" ref_url="https://www.suse.com/security/cve/CVE-2015-8067/" source="CVE"/>
		<reference ref_id="CVE-2015-8068" ref_url="https://www.suse.com/security/cve/CVE-2015-8068/" source="CVE"/>
		<reference ref_id="CVE-2015-8069" ref_url="https://www.suse.com/security/cve/CVE-2015-8069/" source="CVE"/>
		<reference ref_id="CVE-2015-8070" ref_url="https://www.suse.com/security/cve/CVE-2015-8070/" source="CVE"/>
		<reference ref_id="CVE-2015-8071" ref_url="https://www.suse.com/security/cve/CVE-2015-8071/" source="CVE"/>
		<reference ref_id="CVE-2015-8401" ref_url="https://www.suse.com/security/cve/CVE-2015-8401/" source="CVE"/>
		<reference ref_id="CVE-2015-8402" ref_url="https://www.suse.com/security/cve/CVE-2015-8402/" source="CVE"/>
		<reference ref_id="CVE-2015-8403" ref_url="https://www.suse.com/security/cve/CVE-2015-8403/" source="CVE"/>
		<reference ref_id="CVE-2015-8404" ref_url="https://www.suse.com/security/cve/CVE-2015-8404/" source="CVE"/>
		<reference ref_id="CVE-2015-8405" ref_url="https://www.suse.com/security/cve/CVE-2015-8405/" source="CVE"/>
		<reference ref_id="CVE-2015-8406" ref_url="https://www.suse.com/security/cve/CVE-2015-8406/" source="CVE"/>
		<reference ref_id="CVE-2015-8407" ref_url="https://www.suse.com/security/cve/CVE-2015-8407/" source="CVE"/>
		<reference ref_id="CVE-2015-8408" ref_url="https://www.suse.com/security/cve/CVE-2015-8408/" source="CVE"/>
		<reference ref_id="CVE-2015-8409" ref_url="https://www.suse.com/security/cve/CVE-2015-8409/" source="CVE"/>
		<reference ref_id="CVE-2015-8410" ref_url="https://www.suse.com/security/cve/CVE-2015-8410/" source="CVE"/>
		<reference ref_id="CVE-2015-8411" ref_url="https://www.suse.com/security/cve/CVE-2015-8411/" source="CVE"/>
		<reference ref_id="CVE-2015-8412" ref_url="https://www.suse.com/security/cve/CVE-2015-8412/" source="CVE"/>
		<reference ref_id="CVE-2015-8413" ref_url="https://www.suse.com/security/cve/CVE-2015-8413/" source="CVE"/>
		<reference ref_id="CVE-2015-8414" ref_url="https://www.suse.com/security/cve/CVE-2015-8414/" source="CVE"/>
		<reference ref_id="CVE-2015-8415" ref_url="https://www.suse.com/security/cve/CVE-2015-8415/" source="CVE"/>
		<reference ref_id="CVE-2015-8416" ref_url="https://www.suse.com/security/cve/CVE-2015-8416/" source="CVE"/>
		<reference ref_id="CVE-2015-8417" ref_url="https://www.suse.com/security/cve/CVE-2015-8417/" source="CVE"/>
		<reference ref_id="CVE-2015-8418" ref_url="https://www.suse.com/security/cve/CVE-2015-8418/" source="CVE"/>
		<reference ref_id="CVE-2015-8419" ref_url="https://www.suse.com/security/cve/CVE-2015-8419/" source="CVE"/>
		<reference ref_id="CVE-2015-8420" ref_url="https://www.suse.com/security/cve/CVE-2015-8420/" source="CVE"/>
		<reference ref_id="CVE-2015-8421" ref_url="https://www.suse.com/security/cve/CVE-2015-8421/" source="CVE"/>
		<reference ref_id="CVE-2015-8422" ref_url="https://www.suse.com/security/cve/CVE-2015-8422/" source="CVE"/>
		<reference ref_id="CVE-2015-8423" ref_url="https://www.suse.com/security/cve/CVE-2015-8423/" source="CVE"/>
		<reference ref_id="CVE-2015-8424" ref_url="https://www.suse.com/security/cve/CVE-2015-8424/" source="CVE"/>
		<reference ref_id="CVE-2015-8425" ref_url="https://www.suse.com/security/cve/CVE-2015-8425/" source="CVE"/>
		<reference ref_id="CVE-2015-8426" ref_url="https://www.suse.com/security/cve/CVE-2015-8426/" source="CVE"/>
		<reference ref_id="CVE-2015-8427" ref_url="https://www.suse.com/security/cve/CVE-2015-8427/" source="CVE"/>
		<reference ref_id="CVE-2015-8428" ref_url="https://www.suse.com/security/cve/CVE-2015-8428/" source="CVE"/>
		<reference ref_id="CVE-2015-8429" ref_url="https://www.suse.com/security/cve/CVE-2015-8429/" source="CVE"/>
		<reference ref_id="CVE-2015-8430" ref_url="https://www.suse.com/security/cve/CVE-2015-8430/" source="CVE"/>
		<reference ref_id="CVE-2015-8431" ref_url="https://www.suse.com/security/cve/CVE-2015-8431/" source="CVE"/>
		<reference ref_id="CVE-2015-8432" ref_url="https://www.suse.com/security/cve/CVE-2015-8432/" source="CVE"/>
		<reference ref_id="CVE-2015-8433" ref_url="https://www.suse.com/security/cve/CVE-2015-8433/" source="CVE"/>
		<reference ref_id="CVE-2015-8434" ref_url="https://www.suse.com/security/cve/CVE-2015-8434/" source="CVE"/>
		<reference ref_id="CVE-2015-8435" ref_url="https://www.suse.com/security/cve/CVE-2015-8435/" source="CVE"/>
		<reference ref_id="CVE-2015-8436" ref_url="https://www.suse.com/security/cve/CVE-2015-8436/" source="CVE"/>
		<reference ref_id="CVE-2015-8437" ref_url="https://www.suse.com/security/cve/CVE-2015-8437/" source="CVE"/>
		<reference ref_id="CVE-2015-8438" ref_url="https://www.suse.com/security/cve/CVE-2015-8438/" source="CVE"/>
		<reference ref_id="CVE-2015-8439" ref_url="https://www.suse.com/security/cve/CVE-2015-8439/" source="CVE"/>
		<reference ref_id="CVE-2015-8440" ref_url="https://www.suse.com/security/cve/CVE-2015-8440/" source="CVE"/>
		<reference ref_id="CVE-2015-8441" ref_url="https://www.suse.com/security/cve/CVE-2015-8441/" source="CVE"/>
		<reference ref_id="CVE-2015-8442" ref_url="https://www.suse.com/security/cve/CVE-2015-8442/" source="CVE"/>
		<reference ref_id="CVE-2015-8443" ref_url="https://www.suse.com/security/cve/CVE-2015-8443/" source="CVE"/>
		<reference ref_id="CVE-2015-8444" ref_url="https://www.suse.com/security/cve/CVE-2015-8444/" source="CVE"/>
		<reference ref_id="CVE-2015-8445" ref_url="https://www.suse.com/security/cve/CVE-2015-8445/" source="CVE"/>
		<reference ref_id="CVE-2015-8446" ref_url="https://www.suse.com/security/cve/CVE-2015-8446/" source="CVE"/>
		<reference ref_id="CVE-2015-8447" ref_url="https://www.suse.com/security/cve/CVE-2015-8447/" source="CVE"/>
		<reference ref_id="CVE-2015-8448" ref_url="https://www.suse.com/security/cve/CVE-2015-8448/" source="CVE"/>
		<reference ref_id="CVE-2015-8449" ref_url="https://www.suse.com/security/cve/CVE-2015-8449/" source="CVE"/>
		<reference ref_id="CVE-2015-8450" ref_url="https://www.suse.com/security/cve/CVE-2015-8450/" source="CVE"/>
		<reference ref_id="CVE-2015-8451" ref_url="https://www.suse.com/security/cve/CVE-2015-8451/" source="CVE"/>
		<reference ref_id="CVE-2015-8452" ref_url="https://www.suse.com/security/cve/CVE-2015-8452/" source="CVE"/>
		<reference ref_id="CVE-2015-8453" ref_url="https://www.suse.com/security/cve/CVE-2015-8453/" source="CVE"/>
		<reference ref_id="CVE-2015-8454" ref_url="https://www.suse.com/security/cve/CVE-2015-8454/" source="CVE"/>
		<reference ref_id="CVE-2015-8455" ref_url="https://www.suse.com/security/cve/CVE-2015-8455/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00007.html" source="SUSE-SU"/>
		<description>

This update for flash-player to version 11.2.202.554 fixes the following security issues
in Adobe security advisory APSB15-32.

* These updates resolve heap buffer overflow vulnerabilities that could
  lead to code execution (CVE-2015-8438, CVE-2015-8446).
* These updates resolve memory corruption vulnerabilities that could
  lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417,
  CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045,
  CVE-2015-8418, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408).
* These updates resolve security bypass vulnerabilities (CVE-2015-8453,
  CVE-2015-8440, CVE-2015-8409).
* These updates resolve a stack overflow vulnerability that could lead
  to code execution (CVE-2015-8407).
* These updates resolve a type confusion vulnerability that could lead
  to code execution (CVE-2015-8439).
* These updates resolve an integer overflow vulnerability that could
  lead to code execution (CVE-2015-8445).
* These updates resolve a buffer overflow vulnerability that could lead
  to code execution (CVE-2015-8415)
* These updates resolve use-after-free vulnerabilities that could
  lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437,
  CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452,
  CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411,
  CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423,
  CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426,
  CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434,
  CVE-2015-8435, CVE-2015-8414, CVE-2015-8454, CVE-2015-8059, CVE-2015-8058,
  CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067,
  CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065,
  CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403,
  CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070,
  CVE-2015-8441, CVE-2015-8442, CVE-2015-8447).

Please also see
        https://helpx.adobe.com/security/products/flash-player/apsb15-32.html
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-09"/>
	<updated date="2015-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/958324">SUSE bug 958324</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8045/">CVE-2015-8045</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8047/">CVE-2015-8047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8048/">CVE-2015-8048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8049/">CVE-2015-8049</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8050/">CVE-2015-8050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8055/">CVE-2015-8055</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8056/">CVE-2015-8056</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8057/">CVE-2015-8057</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8058/">CVE-2015-8058</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8059/">CVE-2015-8059</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8060/">CVE-2015-8060</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8061/">CVE-2015-8061</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8062/">CVE-2015-8062</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8063/">CVE-2015-8063</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8064/">CVE-2015-8064</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8065/">CVE-2015-8065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8066/">CVE-2015-8066</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8067/">CVE-2015-8067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8068/">CVE-2015-8068</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8069/">CVE-2015-8069</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8070/">CVE-2015-8070</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8071/">CVE-2015-8071</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8401/">CVE-2015-8401</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8402/">CVE-2015-8402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8403/">CVE-2015-8403</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8404/">CVE-2015-8404</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8405/">CVE-2015-8405</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8406/">CVE-2015-8406</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8407/">CVE-2015-8407</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8408/">CVE-2015-8408</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8409/">CVE-2015-8409</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8410/">CVE-2015-8410</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8411/">CVE-2015-8411</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8412/">CVE-2015-8412</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8413/">CVE-2015-8413</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8414/">CVE-2015-8414</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8415/">CVE-2015-8415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8416/">CVE-2015-8416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8417/">CVE-2015-8417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8418/">CVE-2015-8418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8419/">CVE-2015-8419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8420/">CVE-2015-8420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8421/">CVE-2015-8421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8422/">CVE-2015-8422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8423/">CVE-2015-8423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8424/">CVE-2015-8424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8425/">CVE-2015-8425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8426/">CVE-2015-8426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8427/">CVE-2015-8427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8428/">CVE-2015-8428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8429/">CVE-2015-8429</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8430/">CVE-2015-8430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8431/">CVE-2015-8431</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8432/">CVE-2015-8432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8433/">CVE-2015-8433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8434/">CVE-2015-8434</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8435/">CVE-2015-8435</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8436/">CVE-2015-8436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8437/">CVE-2015-8437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8438/">CVE-2015-8438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8439/">CVE-2015-8439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8440/">CVE-2015-8440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8441/">CVE-2015-8441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8442/">CVE-2015-8442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8443/">CVE-2015-8443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8444/">CVE-2015-8444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8445/">CVE-2015-8445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8446/">CVE-2015-8446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8447/">CVE-2015-8447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8448/">CVE-2015-8448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8449/">CVE-2015-8449</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8450/">CVE-2015-8450</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8451/">CVE-2015-8451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8452/">CVE-2015-8452</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8453/">CVE-2015-8453</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8454/">CVE-2015-8454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8455/">CVE-2015-8455</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566559" comment="flash-player-11.2.202.554-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566560" comment="flash-player-gnome-11.2.202.554-0.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566561" comment="flash-player-kde4-11.2.202.554-0.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78547" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="960317" ref_url="https://bugzilla.suse.com/960317" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8459" ref_url="https://www.suse.com/security/cve/CVE-2015-8459/" source="CVE"/>
		<reference ref_id="CVE-2015-8460" ref_url="https://www.suse.com/security/cve/CVE-2015-8460/" source="CVE"/>
		<reference ref_id="CVE-2015-8634" ref_url="https://www.suse.com/security/cve/CVE-2015-8634/" source="CVE"/>
		<reference ref_id="CVE-2015-8635" ref_url="https://www.suse.com/security/cve/CVE-2015-8635/" source="CVE"/>
		<reference ref_id="CVE-2015-8636" ref_url="https://www.suse.com/security/cve/CVE-2015-8636/" source="CVE"/>
		<reference ref_id="CVE-2015-8638" ref_url="https://www.suse.com/security/cve/CVE-2015-8638/" source="CVE"/>
		<reference ref_id="CVE-2015-8639" ref_url="https://www.suse.com/security/cve/CVE-2015-8639/" source="CVE"/>
		<reference ref_id="CVE-2015-8640" ref_url="https://www.suse.com/security/cve/CVE-2015-8640/" source="CVE"/>
		<reference ref_id="CVE-2015-8641" ref_url="https://www.suse.com/security/cve/CVE-2015-8641/" source="CVE"/>
		<reference ref_id="CVE-2015-8642" ref_url="https://www.suse.com/security/cve/CVE-2015-8642/" source="CVE"/>
		<reference ref_id="CVE-2015-8643" ref_url="https://www.suse.com/security/cve/CVE-2015-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-8644" ref_url="https://www.suse.com/security/cve/CVE-2015-8644/" source="CVE"/>
		<reference ref_id="CVE-2015-8645" ref_url="https://www.suse.com/security/cve/CVE-2015-8645/" source="CVE"/>
		<reference ref_id="CVE-2015-8646" ref_url="https://www.suse.com/security/cve/CVE-2015-8646/" source="CVE"/>
		<reference ref_id="CVE-2015-8647" ref_url="https://www.suse.com/security/cve/CVE-2015-8647/" source="CVE"/>
		<reference ref_id="CVE-2015-8648" ref_url="https://www.suse.com/security/cve/CVE-2015-8648/" source="CVE"/>
		<reference ref_id="CVE-2015-8649" ref_url="https://www.suse.com/security/cve/CVE-2015-8649/" source="CVE"/>
		<reference ref_id="CVE-2015-8650" ref_url="https://www.suse.com/security/cve/CVE-2015-8650/" source="CVE"/>
		<reference ref_id="CVE-2015-8651" ref_url="https://www.suse.com/security/cve/CVE-2015-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

   - CVE-2015-8644: Type confusion vulnerability that could lead to code execution.
   - CVE-2015-8651: Integer overflow vulnerability that could lead to code execution.
   - CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650: Use-after-free vulnerabilities that could lead to code execution.
   - CVE-2015-8459, CVE-2015-8460, CVE-2015-8636, CVE-2015-8645: Memory corruption vulnerabilities that could lead to code execution.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-30"/>
	<updated date="2015-12-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/960317">SUSE bug 960317</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8459/">CVE-2015-8459</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8460/">CVE-2015-8460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8634/">CVE-2015-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8635/">CVE-2015-8635</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8636/">CVE-2015-8636</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8638/">CVE-2015-8638</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8639/">CVE-2015-8639</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8640/">CVE-2015-8640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8641/">CVE-2015-8641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8642/">CVE-2015-8642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8643/">CVE-2015-8643</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8644/">CVE-2015-8644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8645/">CVE-2015-8645</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8646/">CVE-2015-8646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8647/">CVE-2015-8647</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8648/">CVE-2015-8648</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8649/">CVE-2015-8649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8650/">CVE-2015-8650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-8651/">CVE-2015-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566562" comment="flash-player-11.2.202.559-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566563" comment="flash-player-gnome-11.2.202.559-0.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566564" comment="flash-player-kde4-11.2.202.559-0.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78548" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="965901" ref_url="https://bugzilla.suse.com/965901" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0964" ref_url="https://www.suse.com/security/cve/CVE-2016-0964/" source="CVE"/>
		<reference ref_id="CVE-2016-0965" ref_url="https://www.suse.com/security/cve/CVE-2016-0965/" source="CVE"/>
		<reference ref_id="CVE-2016-0966" ref_url="https://www.suse.com/security/cve/CVE-2016-0966/" source="CVE"/>
		<reference ref_id="CVE-2016-0967" ref_url="https://www.suse.com/security/cve/CVE-2016-0967/" source="CVE"/>
		<reference ref_id="CVE-2016-0968" ref_url="https://www.suse.com/security/cve/CVE-2016-0968/" source="CVE"/>
		<reference ref_id="CVE-2016-0969" ref_url="https://www.suse.com/security/cve/CVE-2016-0969/" source="CVE"/>
		<reference ref_id="CVE-2016-0970" ref_url="https://www.suse.com/security/cve/CVE-2016-0970/" source="CVE"/>
		<reference ref_id="CVE-2016-0971" ref_url="https://www.suse.com/security/cve/CVE-2016-0971/" source="CVE"/>
		<reference ref_id="CVE-2016-0972" ref_url="https://www.suse.com/security/cve/CVE-2016-0972/" source="CVE"/>
		<reference ref_id="CVE-2016-0973" ref_url="https://www.suse.com/security/cve/CVE-2016-0973/" source="CVE"/>
		<reference ref_id="CVE-2016-0974" ref_url="https://www.suse.com/security/cve/CVE-2016-0974/" source="CVE"/>
		<reference ref_id="CVE-2016-0975" ref_url="https://www.suse.com/security/cve/CVE-2016-0975/" source="CVE"/>
		<reference ref_id="CVE-2016-0976" ref_url="https://www.suse.com/security/cve/CVE-2016-0976/" source="CVE"/>
		<reference ref_id="CVE-2016-0977" ref_url="https://www.suse.com/security/cve/CVE-2016-0977/" source="CVE"/>
		<reference ref_id="CVE-2016-0978" ref_url="https://www.suse.com/security/cve/CVE-2016-0978/" source="CVE"/>
		<reference ref_id="CVE-2016-0979" ref_url="https://www.suse.com/security/cve/CVE-2016-0979/" source="CVE"/>
		<reference ref_id="CVE-2016-0980" ref_url="https://www.suse.com/security/cve/CVE-2016-0980/" source="CVE"/>
		<reference ref_id="CVE-2016-0981" ref_url="https://www.suse.com/security/cve/CVE-2016-0981/" source="CVE"/>
		<reference ref_id="CVE-2016-0982" ref_url="https://www.suse.com/security/cve/CVE-2016-0982/" source="CVE"/>
		<reference ref_id="CVE-2016-0983" ref_url="https://www.suse.com/security/cve/CVE-2016-0983/" source="CVE"/>
		<reference ref_id="CVE-2016-0984" ref_url="https://www.suse.com/security/cve/CVE-2016-0984/" source="CVE"/>
		<reference ref_id="CVE-2016-0985" ref_url="https://www.suse.com/security/cve/CVE-2016-0985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html" source="SUSE-SU"/>
		<description>

This update for flash-player fixes the following issues:

- Security update to 11.2.202.569 (bsc#965901):
  * APSB16-04, CVE-2016-0964, CVE-2016-0965, CVE-2016-0966,
    CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970,
    CVE-2016-0971, CVE-2016-0972, CVE-2016-0973, CVE-2016-0974,
    CVE-2016-0975, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978,
    CVE-2016-0979, CVE-2016-0980, CVE-2016-0981, CVE-2016-0982,
    CVE-2016-0983, CVE-2016-0984, CVE-2016-0985
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-10"/>
	<updated date="2016-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/965901">SUSE bug 965901</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0964/">CVE-2016-0964</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0965/">CVE-2016-0965</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0966/">CVE-2016-0966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0967/">CVE-2016-0967</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0968/">CVE-2016-0968</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0969/">CVE-2016-0969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0970/">CVE-2016-0970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0971/">CVE-2016-0971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0972/">CVE-2016-0972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0973/">CVE-2016-0973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0974/">CVE-2016-0974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0975/">CVE-2016-0975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0976/">CVE-2016-0976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0977/">CVE-2016-0977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0978/">CVE-2016-0978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0979/">CVE-2016-0979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0980/">CVE-2016-0980</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0981/">CVE-2016-0981</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0982/">CVE-2016-0982</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0983/">CVE-2016-0983</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0984/">CVE-2016-0984</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0985/">CVE-2016-0985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567314" comment="flash-player-11.2.202.569-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567315" comment="flash-player-gnome-11.2.202.569-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567316" comment="flash-player-kde4-11.2.202.569-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78549" version="1" class="patch">
	<metadata>
		<title>Security update for flash-player (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="970547" ref_url="https://bugzilla.suse.com/970547" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0960" ref_url="https://www.suse.com/security/cve/CVE-2016-0960/" source="CVE"/>
		<reference ref_id="CVE-2016-0961" ref_url="https://www.suse.com/security/cve/CVE-2016-0961/" source="CVE"/>
		<reference ref_id="CVE-2016-0962" ref_url="https://www.suse.com/security/cve/CVE-2016-0962/" source="CVE"/>
		<reference ref_id="CVE-2016-0963" ref_url="https://www.suse.com/security/cve/CVE-2016-0963/" source="CVE"/>
		<reference ref_id="CVE-2016-0986" ref_url="https://www.suse.com/security/cve/CVE-2016-0986/" source="CVE"/>
		<reference ref_id="CVE-2016-0987" ref_url="https://www.suse.com/security/cve/CVE-2016-0987/" source="CVE"/>
		<reference ref_id="CVE-2016-0988" ref_url="https://www.suse.com/security/cve/CVE-2016-0988/" source="CVE"/>
		<reference ref_id="CVE-2016-0989" ref_url="https://www.suse.com/security/cve/CVE-2016-0989/" source="CVE"/>
		<reference ref_id="CVE-2016-0990" ref_url="https://www.suse.com/security/cve/CVE-2016-0990/" source="CVE"/>
		<reference ref_id="CVE-2016-0991" ref_url="https://www.suse.com/security/cve/CVE-2016-0991/" source="CVE"/>
		<reference ref_id="CVE-2016-0992" ref_url="https://www.suse.com/security/cve/CVE-2016-0992/" source="CVE"/>
		<reference ref_id="CVE-2016-0993" ref_url="https://www.suse.com/security/cve/CVE-2016-0993/" source="CVE"/>
		<reference ref_id="CVE-2016-0994" ref_url="https://www.suse.com/security/cve/CVE-2016-0994/" source="CVE"/>
		<reference ref_id="CVE-2016-0995" ref_url="https://www.suse.com/security/cve/CVE-2016-0995/" source="CVE"/>
		<reference ref_id="CVE-2016-0996" ref_url="https://www.suse.com/security/cve/CVE-2016-0996/" source="CVE"/>
		<reference ref_id="CVE-2016-0997" ref_url="https://www.suse.com/security/cve/CVE-2016-0997/" source="CVE"/>
		<reference ref_id="CVE-2016-0998" ref_url="https://www.suse.com/security/cve/CVE-2016-0998/" source="CVE"/>
		<reference ref_id="CVE-2016-0999" ref_url="https://www.suse.com/security/cve/CVE-2016-0999/" source="CVE"/>
		<reference ref_id="CVE-2016-1000" ref_url="https://www.suse.com/security/cve/CVE-2016-1000/" source="CVE"/>
		<reference ref_id="CVE-2016-1001" ref_url="https://www.suse.com/security/cve/CVE-2016-1001/" source="CVE"/>
		<reference ref_id="CVE-2016-1002" ref_url="https://www.suse.com/security/cve/CVE-2016-1002/" source="CVE"/>
		<reference ref_id="CVE-2016-1005" ref_url="https://www.suse.com/security/cve/CVE-2016-1005/" source="CVE"/>
		<reference ref_id="CVE-2016-1010" ref_url="https://www.suse.com/security/cve/CVE-2016-1010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00023.html" source="SUSE-SU"/>
		<description>

Adobe flash-player was updated to 11.2.202.577 to fix the following
list of security issues (bsc#970547):

These updates resolve integer overflow vulnerabilities that could lead
to code execution (CVE-2016-0963, CVE-2016-0993, CVE-2016-1010).

These updates resolve use-after-free vulnerabilities that could
lead to code execution (CVE-2016-0987, CVE-2016-0988, CVE-2016-0990,
CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997,
CVE-2016-0998, CVE-2016-0999, CVE-2016-1000).

These updates resolve a heap overflow vulnerability that could lead to
code execution (CVE-2016-1001).

These updates resolve memory corruption vulnerabilities that could
lead to code execution (CVE-2016-0960, CVE-2016-0961, CVE-2016-0962,
CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002,
CVE-2016-1005).

Adobe advisory with more information:
https://helpx.adobe.com/security/products/flash-player/apsb16-08.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/970547">SUSE bug 970547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0960/">CVE-2016-0960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0961/">CVE-2016-0961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0962/">CVE-2016-0962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0963/">CVE-2016-0963</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0986/">CVE-2016-0986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0987/">CVE-2016-0987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0988/">CVE-2016-0988</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0989/">CVE-2016-0989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0990/">CVE-2016-0990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0991/">CVE-2016-0991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0992/">CVE-2016-0992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0993/">CVE-2016-0993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0994/">CVE-2016-0994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0995/">CVE-2016-0995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0996/">CVE-2016-0996</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0997/">CVE-2016-0997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0998/">CVE-2016-0998</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0999/">CVE-2016-0999</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000/">CVE-2016-1000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1001/">CVE-2016-1001</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1002/">CVE-2016-1002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1005/">CVE-2016-1005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1010/">CVE-2016-1010</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567317" comment="flash-player-11.2.202.577-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567318" comment="flash-player-gnome-11.2.202.577-0.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567319" comment="flash-player-kde4-11.2.202.577-0.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78550" version="1" class="patch">
	<metadata>
		<title>Security update for foomatic-filters (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="957531" ref_url="https://bugzilla.suse.com/957531" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<description>

This update fixes the following security issues:

CVE-2015-8327: adds backtick and semicolon to the list of illegal shell escape characters (bsc#957531).
CVE-2015-8560: fixed code execution via improper escaping of ;  (bsc#957531).   
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566565" comment="foomatic-filters-3.0.2-269.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78551" version="1" class="patch">
	<metadata>
		<title>Security update for gcc5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="939460" ref_url="https://bugzilla.suse.com/939460" source="BUGZILLA"/>
		<reference ref_id="945842" ref_url="https://bugzilla.suse.com/945842" source="BUGZILLA"/>
		<reference ref_id="953831" ref_url="https://bugzilla.suse.com/953831" source="BUGZILLA"/>
		<reference ref_id="955382" ref_url="https://bugzilla.suse.com/955382" source="BUGZILLA"/>
		<reference ref_id="962765" ref_url="https://bugzilla.suse.com/962765" source="BUGZILLA"/>
		<reference ref_id="964468" ref_url="https://bugzilla.suse.com/964468" source="BUGZILLA"/>
		<reference ref_id="966220" ref_url="https://bugzilla.suse.com/966220" source="BUGZILLA"/>
		<reference ref_id="968771" ref_url="https://bugzilla.suse.com/968771" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001973.html" source="SUSE-SU"/>
		<description>

The GNU Compiler Collection was updated to version 5.3.1, which brings several fixes
and enhancements.

The following security issue has been fixed:

- Fix C++11 std::random_device short read issue that could lead to predictable
  randomness. (CVE-2015-5276, bsc#945842)

The following non-security issues have been fixed:

- Enable frame pointer for TARGET_64BIT_MS_ABI when stack is misaligned. Fixes internal
  compiler error when building Wine. (bsc#966220)
- Fix a PowerPC specific issue in gcc-go that broke compilation of newer versions of
  Docker. (bsc#964468)
- Fix HTM built-ins on PowerPC. (bsc#955382)
- Fix libgo certificate lookup. (bsc#953831)
- Suppress deprecated-declarations warnings for inline definitions of deprecated virtual
  methods. (bsc#939460)
- Revert accidental libffi ABI breakage on aarch64. (bsc#968771)
- On x86_64, set default 32bit code generation to -march=x86-64 rather than -march=i586.
- Add experimental File System TS library.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/939460">SUSE bug 939460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953831">SUSE bug 953831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955382">SUSE bug 955382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962765">SUSE bug 962765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964468">SUSE bug 964468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966220">SUSE bug 966220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968771">SUSE bug 968771</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567320" comment="libgcc_s1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567321" comment="libgcc_s1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567322" comment="libgfortran3-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567323" comment="libgfortran3-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567324" comment="libgomp1-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567325" comment="libgomp1-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567326" comment="libquadmath0-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567327" comment="libquadmath0-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567328" comment="libstdc++6-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567329" comment="libstdc++6-32bit-5.3.1+r233831-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567330" comment="libstdc++6-locale-5.3.1+r233831-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78552" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="960319" ref_url="https://bugzilla.suse.com/960319" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<description>

This update for giflib fixes the following issues:

- CVE-2015-7555: Heap overflow in giffix (bsc#960319)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566572" comment="giflib-4.1.6-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566573" comment="giflib-32bit-4.1.6-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78553" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="830257" ref_url="https://bugzilla.suse.com/830257" source="BUGZILLA"/>
		<reference ref_id="851280" ref_url="https://bugzilla.suse.com/851280" source="BUGZILLA"/>
		<reference ref_id="918187" ref_url="https://bugzilla.suse.com/918187" source="BUGZILLA"/>
		<reference ref_id="920338" ref_url="https://bugzilla.suse.com/920338" source="BUGZILLA"/>
		<reference ref_id="927080" ref_url="https://bugzilla.suse.com/927080" source="BUGZILLA"/>
		<reference ref_id="928723" ref_url="https://bugzilla.suse.com/928723" source="BUGZILLA"/>
		<reference ref_id="932059" ref_url="https://bugzilla.suse.com/932059" source="BUGZILLA"/>
		<reference ref_id="933770" ref_url="https://bugzilla.suse.com/933770" source="BUGZILLA"/>
		<reference ref_id="933903" ref_url="https://bugzilla.suse.com/933903" source="BUGZILLA"/>
		<reference ref_id="935286" ref_url="https://bugzilla.suse.com/935286" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<description>
This update for glibc provides fixes for security and non-security issues.

These security issues have been fixed:

- CVE-2015-1781: Buffer length after padding in resolv/nss_dns/dns-host.c. (bsc#927080)
- CVE-2013-2207: pt_chown did not properly check permissions for tty files, which allowed
  local users to change the permission on the files and obtain access to arbitrary
  pseudo-terminals by leveraging a FUSE file system. (bsc#830257)
- CVE-2014-8121: DB_LOOKUP in the Name Service Switch (NSS) did not properly check if a
  file is open, which allowed remote attackers to cause a denial of service (infinite loop)
  by performing a look-up while the database is iterated over the database, which triggers
  the file pointer to be reset. (bsc#918187)
- Fix read past end of pattern in fnmatch. (bsc#920338)

These non-security issues have been fixed:

- Fix locking in _IO_flush_all_lockp() to prevent deadlocks in applications. (bsc#851280)
- Record TTL also for DNS PTR queries. (bsc#928723)
- Fix invalid free in ld.so. (bsc#932059)
- Make PowerPC64 default to non-executable stack. (bsc#933770)
- Fix floating point exceptions in some circumstances with exp() and friends. (bsc#933903)
- Fix bad TEXTREL in glibc.i686. (bsc#935286)
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-31"/>
	<updated date="2015-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851280">SUSE bug 851280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928723">SUSE bug 928723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932059">SUSE bug 932059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933770">SUSE bug 933770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933903">SUSE bug 933903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935286">SUSE bug 935286</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566585" comment="glibc-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566586" comment="glibc-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566587" comment="glibc-devel-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566588" comment="glibc-devel-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566589" comment="glibc-i18ndata-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566590" comment="glibc-locale-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566591" comment="glibc-locale-32bit-2.11.3-17.87.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566592" comment="nscd-2.11.3-17.87.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78554" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="930721" ref_url="https://bugzilla.suse.com/930721" source="BUGZILLA"/>
		<reference ref_id="942317" ref_url="https://bugzilla.suse.com/942317" source="BUGZILLA"/>
		<reference ref_id="950944" ref_url="https://bugzilla.suse.com/950944" source="BUGZILLA"/>
		<reference ref_id="956988" ref_url="https://bugzilla.suse.com/956988" source="BUGZILLA"/>
		<reference ref_id="961721" ref_url="https://bugzilla.suse.com/961721" source="BUGZILLA"/>
		<reference ref_id="962736" ref_url="https://bugzilla.suse.com/962736" source="BUGZILLA"/>
		<reference ref_id="962737" ref_url="https://bugzilla.suse.com/962737" source="BUGZILLA"/>
		<reference ref_id="962738" ref_url="https://bugzilla.suse.com/962738" source="BUGZILLA"/>
		<reference ref_id="962739" ref_url="https://bugzilla.suse.com/962739" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:

- CVE-2015-7547: A stack-based buffer overflow in getaddrinfo allowed remote attackers to cause a crash or execute arbitrary code via crafted and timed DNS responses (bsc#961721)
- CVE-2015-8777: Insufficient checking of LD_POINTER_GUARD environment variable allowed local attackers to bypass the pointer guarding protection of the dynamic loader on set-user-ID and set-group-ID programs (bsc#950944)
- CVE-2015-8776: Out-of-range time values passed to the strftime function may cause it to crash, leading to a denial of service, or potentially disclosure information (bsc#962736)
- CVE-2015-8778: Integer overflow in hcreate and hcreate_r could have caused an out-of-bound memory access. leading to application crashes or, potentially, arbitrary code execution (bsc#962737)
- CVE-2014-9761: A stack overflow (unbounded alloca) could have caused applications which process long strings with the nan function to crash or, potentially, execute arbitrary code. (bsc#962738)
- CVE-2015-8779: A stack overflow (unbounded alloca) in the catopen function could have caused applications which pass long strings to the catopen function to crash or, potentially execute arbitrary code. (bsc#962739)

The following non-security bugs were fixed:

- bsc#930721: Accept leading and trailing spaces in getdate input string
- bsc#942317: Recognize power8 platform 
- bsc#950944: Always enable pointer guard
- bsc#956988: Fix deadlock in __dl_iterate_phdr
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/930721">SUSE bug 930721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942317">SUSE bug 942317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956988">SUSE bug 956988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566593" comment="glibc-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566594" comment="glibc-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566595" comment="glibc-devel-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566596" comment="glibc-devel-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566597" comment="glibc-i18ndata-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566598" comment="glibc-locale-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566599" comment="glibc-locale-32bit-2.11.3-17.95.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566600" comment="nscd-2.11.3-17.95.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78555" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="925499" ref_url="https://bugzilla.suse.com/925499" source="BUGZILLA"/>
		<reference ref_id="932026" ref_url="https://bugzilla.suse.com/932026" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<description>


This security update of gnutls fixes the following issues:

- use minimal padding for CBC, the default random length padding
  causes problems with some servers (bsc#925499)
  * added gnutls-use_minimal_cbc_padding.patch
- use the default DH minimum for gnutls-cli instead of hardcoding 512
  * CVE-2015-4000 (Logjam) (bsc#932026)
  * added gnutls-CVE-2015-4000-logjam-use_the_default_DH_min_for_cli.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/925499">SUSE bug 925499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566604" comment="gnutls-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566605" comment="libgnutls26-2.4.1-24.39.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566606" comment="libgnutls26-32bit-2.4.1-24.39.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78556" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="924828" ref_url="https://bugzilla.suse.com/924828" source="BUGZILLA"/>
		<reference ref_id="947271" ref_url="https://bugzilla.suse.com/947271" source="BUGZILLA"/>
		<reference ref_id="957568" ref_url="https://bugzilla.suse.com/957568" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-8313" ref_url="https://www.suse.com/security/cve/CVE-2015-8313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<description>

This update for gnutls fixes the following security issues:

- CVE-2015-8313: First byte of the padding in CBC mode is not checked (bsc#957568)
- CVE-2015-2806: Two-byte stack overflow in asn1_der_decoding (bsc#924828)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-11"/>
	<updated date="2016-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947271">SUSE bug 947271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957568">SUSE bug 957568</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8313/">CVE-2015-8313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566607" comment="gnutls-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566608" comment="libgnutls26-2.4.1-24.39.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566609" comment="libgnutls26-32bit-2.4.1-24.39.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78557" version="1" class="patch">
	<metadata>
		<title>Security update for gpg2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="918089" ref_url="https://bugzilla.suse.com/918089" source="BUGZILLA"/>
		<reference ref_id="918090" ref_url="https://bugzilla.suse.com/918090" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606/" source="CVE"/>
		<reference ref_id="CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<description>

This update for gpg2 fixes the following issues: 

- Fix cve-2015-1606 (bsc#918089)
  * Invalid memory read using a garbled keyring
  * 0001-Gpg-prevent-an-invalid-memory-read-using-a-garbled-k.patch
- Fix cve-2015-1607 (bsc#918090)
  * Memcpy with overlapping ranges
  * 0001-Use-inline-functions-to-convert-buffer-data-to-scala.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566612" comment="gpg2-2.0.9-25.33.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566613" comment="gpg2-lang-2.0.9-25.33.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78558" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="884828" ref_url="https://bugzilla.suse.com/884828" source="BUGZILLA"/>
		<reference ref_id="884830" ref_url="https://bugzilla.suse.com/884830" source="BUGZILLA"/>
		<reference ref_id="946148" ref_url="https://bugzilla.suse.com/946148" source="BUGZILLA"/>
		<reference ref_id="952539" ref_url="https://bugzilla.suse.com/952539" source="BUGZILLA"/>
		<reference ref_id="954592" ref_url="https://bugzilla.suse.com/954592" source="BUGZILLA"/>
		<reference ref_id="956631" ref_url="https://bugzilla.suse.com/956631" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00039.html" source="SUSE-SU"/>
		<description>
This update for grub2 provides the following fixes:

A security issues with a bufferoverflow when reading username and password was fixed (bsc#956631, CVE-2015-8370)

Also following bugs were fixed:
- Fix buffer overflows when reading username and password. (bsc#956631, CVE-2015-8370)
- Expand list of grub.cfg search path in PV Xen guests for systems installed
  on btrfs snapshots. (bsc#946148, bsc#952539)
- Add grub.xen config searching path on boot partition. (bsc#884828)
- Add linux16 and initrd16 to grub.xen. (bsc#884830)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-29"/>
	<updated date="2015-12-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/884828">SUSE bug 884828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884830">SUSE bug 884830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946148">SUSE bug 946148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952539">SUSE bug 952539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954592">SUSE bug 954592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567331" comment="grub2-x86_64-efi-2.00-0.54.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567332" comment="grub2-x86_64-xen-2.00-0.54.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78559" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="922741" ref_url="https://bugzilla.suse.com/922741" source="BUGZILLA"/>
		<reference ref_id="942801" ref_url="https://bugzilla.suse.com/942801" source="BUGZILLA"/>
		<reference ref_id="948791" ref_url="https://bugzilla.suse.com/948791" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<description>
gtk2 was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4491: Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, allowed remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that were mishandled during scaling (bsc#942801).
- CVE-2015-7674: Fix overflow when scaling GIF files (bsc#948791).

This non-security issue was fixed:
- Add the script which generates gdk-pixbuf64.loaders to the spec file (bsc#922741).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-07"/>
	<updated date="2015-10-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/922741">SUSE bug 922741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566630" comment="gtk2-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566631" comment="gtk2-32bit-2.18.9-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566632" comment="gtk2-lang-2.18.9-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78560" version="1" class="patch">
	<metadata>
		<title>Security update for gdk2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="958963" ref_url="https://bugzilla.suse.com/958963" source="BUGZILLA"/>
		<reference ref_id="960155" ref_url="https://bugzilla.suse.com/960155" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<description>
This update for gdk2 fixes the following security issues:

- CVE-2015-7552: various overflows, including heap overflow in flipping bmp files (bsc#958963)

The following non-security issues were fixed:

- bsc#960155: fix a possible divide by zero		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-29"/>
	<updated date="2016-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960155">SUSE bug 960155</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566633" comment="gtk2-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566634" comment="gtk2-32bit-2.18.9-0.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566635" comment="gtk2-lang-2.18.9-0.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78561" version="1" class="patch">
	<metadata>
		<title>Security update for icedtea-web (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="944208" ref_url="https://bugzilla.suse.com/944208" source="BUGZILLA"/>
		<reference ref_id="944209" ref_url="https://bugzilla.suse.com/944209" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234/" source="CVE"/>
		<reference ref_id="CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001615.html" source="SUSE-SU"/>
		<description>

The Java Plugin IcedTea Web was updated to 1.5.2, fixing bugs and security issues.

* permissions sandbox and signed app and unsigned app with
  permissions all-permissions now run in sandbox instead of not at
  all.
* fixed DownloadService
* RH1231441 Unable to read the text of the buttons of the
  security dialogue
* Fixed RH1233697 icedtea-web: applet origin spoofing
  (CVE-2015-5235, bsc#944208)
* Fixed RH1233667 icedtea-web: unexpected permanent authorization
  of unsigned applets (CVE-2015-5234, bsc#944209)
* MissingALACAdialog made available also for unsigned applications (but ignoring actual manifest value) and fixed
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/944208">SUSE bug 944208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944209">SUSE bug 944209</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567333" comment="icedtea-web-1.5.3-0.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78562" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="917129" ref_url="https://bugzilla.suse.com/917129" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001640.html" source="SUSE-SU"/>
		<description>
icu was updated to fix one security issue.

This security issue was fixed:
- CVE-2014-9654: Insufficient size limit checks in regular expression compiler (bsc#917129).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-15"/>
	<updated date="2015-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564553" comment="icu-4.0-7.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567334" comment="libicu-4.0-7.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78563" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="938248" ref_url="https://bugzilla.suse.com/938248" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2596" ref_url="https://www.suse.com/security/cve/CVE-2015-2596/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<description>
OpenJDK was updated to 2.6.1 - OpenJDK 7u85 to fix security issues and bugs.

The following vulnerabilities were fixed:

* CVE-2015-2590: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2596: Difficult to exploit vulnerability in the Hotspot component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data.
* CVE-2015-2597: Easily exploitable vulnerability in the Install component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2601: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2613: Easily exploitable vulnerability in the JCE component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data.
* CVE-2015-2619: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2621: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2625: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2627: Very difficult to exploit vulnerability in the Install component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2628: Easily exploitable vulnerability in the CORBA component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2632: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2637: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized read access to a subset of Java accessible data.
* CVE-2015-2638: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2664: Difficult to exploit vulnerability in the Deployment component requiring logon to Operating System. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-2808: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java accessible data.
* CVE-2015-4000: Very difficult to exploit vulnerability in the JSSE component allowed successful unauthenticated network attacks via SSL/TLS. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java accessible data as well as read access to a subset of Java Embedded accessible data. 
* CVE-2015-4729: Very difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized update, insert or delete access to some Java SE accessible data as well as read access to a subset of Java SE accessible data.
* CVE-2015-4731: Easily exploitable vulnerability in the JMX component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4732: Easily exploitable vulnerability in the Libraries component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4733: Easily exploitable vulnerability in the RMI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4736: Difficult to exploit vulnerability in the Deployment component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4748: Very difficult to exploit vulnerability in the Security component allowed successful unauthenticated network attacks via OCSP. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.
* CVE-2015-4749: Difficult to exploit vulnerability in the JNDI component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized ability to cause a partial denial of service (partial DOS).
* CVE-2015-4760: Easily exploitable vulnerability in the 2D component allowed successful unauthenticated network attacks via multiple protocols. Successful attack of this vulnerability could have resulted in unauthorized Operating System takeover including arbitrary code execution.		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-22"/>
	<updated date="2015-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2596/">CVE-2015-2596</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566643" comment="java-1_7_0-openjdk-1.7.0.85-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566644" comment="java-1_7_0-openjdk-demo-1.7.0.85-0.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566645" comment="java-1_7_0-openjdk-devel-1.7.0.85-0.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78564" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="951376" ref_url="https://bugzilla.suse.com/951376" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u91 to fix 17 security issues.

These security issues were fixed:
- CVE-2015-4843: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries (bsc#951376).
- CVE-2015-4842: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to JAXP (bsc#951376).
- CVE-2015-4840: Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via unknown vectors related to 2D (bsc#951376).
- CVE-2015-4872: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect integrity via unknown vectors related to Security (bsc#951376).
- CVE-2015-4860: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883 (bsc#951376).
- CVE-2015-4844: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (bsc#951376).
- CVE-2015-4883: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860 (bsc#951376).
- CVE-2015-4893: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911 (bsc#951376).
- CVE-2015-4911: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893 (bsc#951376).
- CVE-2015-4882: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect availability via vectors related to CORBA (bsc#951376).
- CVE-2015-4881: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835 (bsc#951376).
- CVE-2015-4734: Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to JGSS (bsc#951376).
- CVE-2015-4806: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries (bsc#951376).
- CVE-2015-4805: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization (bsc#951376).
- CVE-2015-4803: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allowed remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911 (bsc#951376).
- CVE-2015-4835: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881 (bsc#951376).
- CVE-2015-4903: Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allowed remote attackers to affect confidentiality via vectors related to RMI (bsc#951376).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-23"/>
	<updated date="2015-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566646" comment="java-1_7_0-openjdk-1.7.0.91-0.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566647" comment="java-1_7_0-openjdk-demo-1.7.0.91-0.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566648" comment="java-1_7_0-openjdk-devel-1.7.0.91-0.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78565" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="960996" ref_url="https://bugzilla.suse.com/960996" source="BUGZILLA"/>
		<reference ref_id="962743" ref_url="https://bugzilla.suse.com/962743" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<description>
java-1_7_0-openjdk was updated to version 7u95 to fix 9 security issues. (bsc#962743)

- CVE-2015-4871: Rebinding of the receiver of a DirectMethodHandle may allow a protected method to be accessed
- CVE-2015-7575: Further reduce use of MD5 (SLOTH) (bsc#960996)
- CVE-2015-8126: Vulnerability in the AWT component related to splashscreen displays
- CVE-2015-8472: Vulnerability in the AWT component, addressed by same fix
- CVE-2016-0402: Vulnerability in the Networking component related to URL processing
- CVE-2016-0448: Vulnerability in the JMX comonent related to attribute processing
- CVE-2016-0466: Vulnerability in the JAXP component, related to limits
- CVE-2016-0483: Vulnerability in the AWT component related to image decoding
- CVE-2016-0494: Vulnerability in 2D component related to font actions
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566649" comment="java-1_7_0-openjdk-1.7.0.95-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566650" comment="java-1_7_0-openjdk-demo-1.7.0.95-0.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566651" comment="java-1_7_0-openjdk-devel-1.7.0.95-0.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78566" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="972468" ref_url="https://bugzilla.suse.com/972468" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html" source="SUSE-SU"/>
		<description>

The OpenJDK Java java-1_7_0-openjdk was updated to 2.6.5 to fix the following issues:

Update to 2.6.5 - OpenJDK 7u99 (bsc#972468)
* Security fixes
  - S8152335, CVE-2016-0636: Improve MethodHandle consistency, which could be used by attackers to inject code.
* Import of OpenJDK 7 u99 build 0
  - S6425769, PR2858: Allow specifying an address to bind JMX
    remote connector
  - S6961123: setWMClass fails to null-terminate WM_CLASS string
  - S8145982, PR2858: JMXInterfaceBindingTest is failing
    intermittently
  - S8146015, PR2858: JMXInterfaceBindingTest is failing
    intermittently for IPv6 addresses
* Backports
  - S8028727, PR2814: [parfait] warnings from b116 for
   jdk.src.share.native.sun.security.ec: JNI pending exceptions
  - S8048512, PR2814: Uninitialised memory in
    jdk/src/share/native/sun/security/ec/ECC_JNI.cpp
  - S8071705. PR2819, RH1182694: Java application menu misbehaves
    when running multiple screen stacked vertically
  - S8150954, PR2866, RH1176206: AWT Robot not compatible with
    GNOME Shell
* Bug fixes
  - PR2803: Make system CUPS optional
  - PR2886: Location of 'stap' executable is hard-coded
  - PR2893: test/tapset/jstaptest.pl should be executable
  - PR2894: Add missing test directory in make check.
* CACAO
  - PR2781, CA195: typeinfo.cpp: typeinfo_merge_nonarrays:
    Assertion `dest &amp;&amp; result &amp;&amp; x.any &amp;&amp; y.any' failed
* AArch64 port
  - PR2852: Add support for large code cache
  - PR2852: Apply ReservedCodeCacheSize default limiting to
    AArch64 only.
  - S8081289, PR2852: aarch64: add support for
    RewriteFrequentPairs in interpreter
  - S8131483, PR2852: aarch64: illegal stlxr instructions
  - S8133352, PR2852: aarch64: generates constrained unpredictable
    instructions
  - S8133842, PR2852: aarch64: C2 generates illegal instructions
    with int shifts &gt;=32
  - S8134322, PR2852: AArch64: Fix several errors in C2 biased
    locking implementation
  - S8136615, PR2852: aarch64: elide DecodeN when followed by
    CmpP 0
  - S8138575, PR2852: Improve generated code for profile counters
  - S8138641, PR2852: Disable C2 peephole by default for aarch64
  - S8138966, PR2852: Intermittent SEGV running ParallelGC
  - S8143067, PR2852: aarch64: guarantee failure in javac
  - S8143285, PR2852: aarch64: Missing load acquire when checking
    if ConstantPoolCacheEntry is resolved
  - S8143584, PR2852: Load constant pool tag and class status with
 load acquire
  - S8144201, PR2852: aarch64:
    jdk/test/com/sun/net/httpserver/Test6a.java fails with
    --enable-unlimited-crypto
  - S8144582, PR2852: AArch64 does not generate correct branch
    profile data
  - S8146709, PR2852: AArch64: Incorrect use of ADRP for
    byte_map_base
  - S8147805, PR2852: aarch64: C1 segmentation fault due to inline
    Unsafe.getAndSetObject
  - S8148240, PR2852: aarch64: random infrequent null pointer
    exceptions in javac
* PPC &amp; AIX port
  - S8034797, PR2851: AIX: Fix os::naked_short_sleep() in
    os_aix.cpp after 8028280
  - S8139258, PR2851: PPC64LE: argument passing problem when
    passing 15 floats in native call
  - S8139421, PR2851: PPC64LE: MacroAssembler::bxx64_patchable
    kill register R12
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/972468">SUSE bug 972468</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567335" comment="java-1_7_0-openjdk-1.7.0.99-0.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567336" comment="java-1_7_0-openjdk-demo-1.7.0.99-0.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567337" comment="java-1_7_0-openjdk-devel-1.7.0.99-0.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78567" version="1" class="patch">
	<metadata>
		<title>Security update for kdebase4-workspace (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="904625" ref_url="https://bugzilla.suse.com/904625" source="BUGZILLA"/>
		<reference ref_id="929718" ref_url="https://bugzilla.suse.com/929718" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8651" ref_url="https://www.suse.com/security/cve/CVE-2014-8651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001839.html" source="SUSE-SU"/>
		<description>

This update for kdebase4-workspace fixes the following issues:

- CVE-2014-8651: Privilege escalation via KDE Clock KCM helper when non-default polkit settings are used (bsc#904625)

The following non-security bugs were fixed:

- bsc#929718: Make kdm recognize an IPv6 localhost address as localhost

		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-01"/>
	<updated date="2016-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/904625">SUSE bug 904625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929718">SUSE bug 929718</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8651/">CVE-2014-8651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566698" comment="kde4-kgreeter-plugins-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566699" comment="kdebase4-wallpapers-4.3.5-0.11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566700" comment="kdebase4-workspace-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566701" comment="kdebase4-workspace-ksysguardd-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566702" comment="kdm-4.3.5-0.12.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566703" comment="kwin-4.3.5-0.12.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78568" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-source (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="777565" ref_url="https://bugzilla.suse.com/777565" source="BUGZILLA"/>
		<reference ref_id="867362" ref_url="https://bugzilla.suse.com/867362" source="BUGZILLA"/>
		<reference ref_id="873385" ref_url="https://bugzilla.suse.com/873385" source="BUGZILLA"/>
		<reference ref_id="883380" ref_url="https://bugzilla.suse.com/883380" source="BUGZILLA"/>
		<reference ref_id="884333" ref_url="https://bugzilla.suse.com/884333" source="BUGZILLA"/>
		<reference ref_id="886785" ref_url="https://bugzilla.suse.com/886785" source="BUGZILLA"/>
		<reference ref_id="891116" ref_url="https://bugzilla.suse.com/891116" source="BUGZILLA"/>
		<reference ref_id="894936" ref_url="https://bugzilla.suse.com/894936" source="BUGZILLA"/>
		<reference ref_id="915517" ref_url="https://bugzilla.suse.com/915517" source="BUGZILLA"/>
		<reference ref_id="917830" ref_url="https://bugzilla.suse.com/917830" source="BUGZILLA"/>
		<reference ref_id="917968" ref_url="https://bugzilla.suse.com/917968" source="BUGZILLA"/>
		<reference ref_id="919463" ref_url="https://bugzilla.suse.com/919463" source="BUGZILLA"/>
		<reference ref_id="920016" ref_url="https://bugzilla.suse.com/920016" source="BUGZILLA"/>
		<reference ref_id="920110" ref_url="https://bugzilla.suse.com/920110" source="BUGZILLA"/>
		<reference ref_id="920250" ref_url="https://bugzilla.suse.com/920250" source="BUGZILLA"/>
		<reference ref_id="920733" ref_url="https://bugzilla.suse.com/920733" source="BUGZILLA"/>
		<reference ref_id="921430" ref_url="https://bugzilla.suse.com/921430" source="BUGZILLA"/>
		<reference ref_id="923002" ref_url="https://bugzilla.suse.com/923002" source="BUGZILLA"/>
		<reference ref_id="923245" ref_url="https://bugzilla.suse.com/923245" source="BUGZILLA"/>
		<reference ref_id="923431" ref_url="https://bugzilla.suse.com/923431" source="BUGZILLA"/>
		<reference ref_id="924701" ref_url="https://bugzilla.suse.com/924701" source="BUGZILLA"/>
		<reference ref_id="925705" ref_url="https://bugzilla.suse.com/925705" source="BUGZILLA"/>
		<reference ref_id="925881" ref_url="https://bugzilla.suse.com/925881" source="BUGZILLA"/>
		<reference ref_id="925903" ref_url="https://bugzilla.suse.com/925903" source="BUGZILLA"/>
		<reference ref_id="926240" ref_url="https://bugzilla.suse.com/926240" source="BUGZILLA"/>
		<reference ref_id="926953" ref_url="https://bugzilla.suse.com/926953" source="BUGZILLA"/>
		<reference ref_id="927355" ref_url="https://bugzilla.suse.com/927355" source="BUGZILLA"/>
		<reference ref_id="928988" ref_url="https://bugzilla.suse.com/928988" source="BUGZILLA"/>
		<reference ref_id="929076" ref_url="https://bugzilla.suse.com/929076" source="BUGZILLA"/>
		<reference ref_id="929142" ref_url="https://bugzilla.suse.com/929142" source="BUGZILLA"/>
		<reference ref_id="929143" ref_url="https://bugzilla.suse.com/929143" source="BUGZILLA"/>
		<reference ref_id="930092" ref_url="https://bugzilla.suse.com/930092" source="BUGZILLA"/>
		<reference ref_id="930934" ref_url="https://bugzilla.suse.com/930934" source="BUGZILLA"/>
		<reference ref_id="931620" ref_url="https://bugzilla.suse.com/931620" source="BUGZILLA"/>
		<reference ref_id="932350" ref_url="https://bugzilla.suse.com/932350" source="BUGZILLA"/>
		<reference ref_id="932458" ref_url="https://bugzilla.suse.com/932458" source="BUGZILLA"/>
		<reference ref_id="932882" ref_url="https://bugzilla.suse.com/932882" source="BUGZILLA"/>
		<reference ref_id="933429" ref_url="https://bugzilla.suse.com/933429" source="BUGZILLA"/>
		<reference ref_id="933721" ref_url="https://bugzilla.suse.com/933721" source="BUGZILLA"/>
		<reference ref_id="933896" ref_url="https://bugzilla.suse.com/933896" source="BUGZILLA"/>
		<reference ref_id="933904" ref_url="https://bugzilla.suse.com/933904" source="BUGZILLA"/>
		<reference ref_id="933907" ref_url="https://bugzilla.suse.com/933907" source="BUGZILLA"/>
		<reference ref_id="933936" ref_url="https://bugzilla.suse.com/933936" source="BUGZILLA"/>
		<reference ref_id="934944" ref_url="https://bugzilla.suse.com/934944" source="BUGZILLA"/>
		<reference ref_id="935053" ref_url="https://bugzilla.suse.com/935053" source="BUGZILLA"/>
		<reference ref_id="935055" ref_url="https://bugzilla.suse.com/935055" source="BUGZILLA"/>
		<reference ref_id="935572" ref_url="https://bugzilla.suse.com/935572" source="BUGZILLA"/>
		<reference ref_id="935705" ref_url="https://bugzilla.suse.com/935705" source="BUGZILLA"/>
		<reference ref_id="935866" ref_url="https://bugzilla.suse.com/935866" source="BUGZILLA"/>
		<reference ref_id="935906" ref_url="https://bugzilla.suse.com/935906" source="BUGZILLA"/>
		<reference ref_id="936077" ref_url="https://bugzilla.suse.com/936077" source="BUGZILLA"/>
		<reference ref_id="936095" ref_url="https://bugzilla.suse.com/936095" source="BUGZILLA"/>
		<reference ref_id="936118" ref_url="https://bugzilla.suse.com/936118" source="BUGZILLA"/>
		<reference ref_id="936423" ref_url="https://bugzilla.suse.com/936423" source="BUGZILLA"/>
		<reference ref_id="936637" ref_url="https://bugzilla.suse.com/936637" source="BUGZILLA"/>
		<reference ref_id="936831" ref_url="https://bugzilla.suse.com/936831" source="BUGZILLA"/>
		<reference ref_id="936875" ref_url="https://bugzilla.suse.com/936875" source="BUGZILLA"/>
		<reference ref_id="936921" ref_url="https://bugzilla.suse.com/936921" source="BUGZILLA"/>
		<reference ref_id="936925" ref_url="https://bugzilla.suse.com/936925" source="BUGZILLA"/>
		<reference ref_id="937032" ref_url="https://bugzilla.suse.com/937032" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937402" ref_url="https://bugzilla.suse.com/937402" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="937503" ref_url="https://bugzilla.suse.com/937503" source="BUGZILLA"/>
		<reference ref_id="937641" ref_url="https://bugzilla.suse.com/937641" source="BUGZILLA"/>
		<reference ref_id="937855" ref_url="https://bugzilla.suse.com/937855" source="BUGZILLA"/>
		<reference ref_id="938485" ref_url="https://bugzilla.suse.com/938485" source="BUGZILLA"/>
		<reference ref_id="939910" ref_url="https://bugzilla.suse.com/939910" source="BUGZILLA"/>
		<reference ref_id="939994" ref_url="https://bugzilla.suse.com/939994" source="BUGZILLA"/>
		<reference ref_id="940338" ref_url="https://bugzilla.suse.com/940338" source="BUGZILLA"/>
		<reference ref_id="940398" ref_url="https://bugzilla.suse.com/940398" source="BUGZILLA"/>
		<reference ref_id="940925" ref_url="https://bugzilla.suse.com/940925" source="BUGZILLA"/>
		<reference ref_id="940966" ref_url="https://bugzilla.suse.com/940966" source="BUGZILLA"/>
		<reference ref_id="942204" ref_url="https://bugzilla.suse.com/942204" source="BUGZILLA"/>
		<reference ref_id="942305" ref_url="https://bugzilla.suse.com/942305" source="BUGZILLA"/>
		<reference ref_id="942350" ref_url="https://bugzilla.suse.com/942350" source="BUGZILLA"/>
		<reference ref_id="942367" ref_url="https://bugzilla.suse.com/942367" source="BUGZILLA"/>
		<reference ref_id="942404" ref_url="https://bugzilla.suse.com/942404" source="BUGZILLA"/>
		<reference ref_id="942605" ref_url="https://bugzilla.suse.com/942605" source="BUGZILLA"/>
		<reference ref_id="942688" ref_url="https://bugzilla.suse.com/942688" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943477" ref_url="https://bugzilla.suse.com/943477" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728/" source="CVE"/>
		<reference ref_id="CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729/" source="CVE"/>
		<reference ref_id="CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730/" source="CVE"/>
		<reference ref_id="CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731/" source="CVE"/>
		<reference ref_id="CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777/" source="CVE"/>
		<reference ref_id="CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420/" source="CVE"/>
		<reference ref_id="CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805/" source="CVE"/>
		<reference ref_id="CVE-2015-2150" ref_url="https://www.suse.com/security/cve/CVE-2015-2150/" source="CVE"/>
		<reference ref_id="CVE-2015-2830" ref_url="https://www.suse.com/security/cve/CVE-2015-2830/" source="CVE"/>
		<reference ref_id="CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167/" source="CVE"/>
		<reference ref_id="CVE-2015-4700" ref_url="https://www.suse.com/security/cve/CVE-2015-4700/" source="CVE"/>
		<reference ref_id="CVE-2015-5364" ref_url="https://www.suse.com/security/cve/CVE-2015-5364/" source="CVE"/>
		<reference ref_id="CVE-2015-5366" ref_url="https://www.suse.com/security/cve/CVE-2015-5366/" source="CVE"/>
		<reference ref_id="CVE-2015-5707" ref_url="https://www.suse.com/security/cve/CVE-2015-5707/" source="CVE"/>
		<reference ref_id="CVE-2015-6252" ref_url="https://www.suse.com/security/cve/CVE-2015-6252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various
security and bugfixes.

Following security bugs were fixed:
* CVE-2015-6252: Possible file descriptor leak for each
  VHOST_SET_LOG_FDcommand issued, this could eventually wasting available
  system resources and creating a denial of service (bsc#942367).
* CVE-2015-5707: Possible integer overflow in the calculation of total
  number of pages in bio_map_user_iov() (bsc#940338).
* CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 do not properly consider yielding a
  processor, which allowed remote attackers to cause a denial of service
  (system hang) via incorrect checksums within a UDP packet flood
  (bsc#936831).
* CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in
  the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return
  values, which allowed remote attackers to cause a denial of service
  (EPOLLET epoll application read outage) via an incorrect checksum in a
  UDP packet, a different vulnerability than CVE-2015-5364 (bsc#936831).
* CVE-2015-1420: Race condition in the handle_to_path function in
  fs/fhandle.c in the Linux kernel through 3.19.1 allowed local users to
  bypass intended size restrictions and trigger read operations on
  additional memory locations by changing the handle_bytes value of a
  file handle during the execution of this function (bsc#915517).
* CVE-2015-1805: The (1) pipe_read and (2) pipe_write implementations in
  fs/pipe.c in the Linux kernel before 3.16 do not properly consider the
  side effects of failed __copy_to_user_inatomic and
  __copy_from_user_inatomic calls, which allows local users to cause a
  denial of service (system crash) or possibly gain privileges via a
  crafted application, aka an 'I/O' vector array overrun. (bsc#933429)
* CVE-2015-2150: Xen 3.3.x through 4.5.x and the Linux kernel through
  3.19.1 do not properly restrict access to PCI command registers, which
  might allow local guest users to cause a denial of service
  (non-maskable interrupt and host crash) by disabling the (1) memory or
  (2) I/O decoding for a PCI Express device and then accessing the
  device, which triggers an Unsupported Request (UR) response.
  (bsc#919463)
* CVE-2015-2830: arch/x86/kernel/entry_64.S in the Linux kernel before
  3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode
  task, which might allow local users to bypass the seccomp or audit
  protection mechanism via a crafted application that uses the (1) fork
  or (2) close system call, as demonstrated by an attack against seccomp
  before 3.16. (bsc#926240)
* CVE-2015-4700: The bpf_int_jit_compile function in
  arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allowed
  local users to cause a denial of service (system crash) by creating a
  packet filter and then loading crafted BPF instructions that trigger
  late convergence by the JIT compiler (bsc#935705).
* CVE-2015-4167: The udf_read_inode function in fs/udf/inode.c in the
  Linux kernel before 3.19.1 did not validate certain length values,
  which allowed local users to cause a denial of service (incorrect data
  representation or integer overflow, and OOPS) via a crafted UDF
  filesystem (bsc#933907).
* CVE-2015-0777: drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0
  (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as
  used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions,
  allows guest OS users to obtain sensitive information from
  uninitialized locations in host OS kernel memory via unspecified
  vectors. (bsc#917830)
* CVE-2014-9728: The UDF filesystem implementation in the Linux kernel
  before 3.18.2 did not validate certain lengths, which allowed local
  users to cause a denial of service (buffer over-read and system crash)
  via a crafted filesystem image, related to fs/udf/inode.c and
  fs/udf/symlink.c (bsc#933904).
* CVE-2014-9730: The udf_pc_to_char function in fs/udf/symlink.c in the
  Linux kernel before 3.18.2 relies on component lengths that are unused,
  which allowed local users to cause a denial of service (system crash)
  via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9729: The udf_read_inode function in fs/udf/inode.c in the
  Linux kernel before 3.18.2 did not ensure a certain data-structure size
  consistency, which allowed local users to cause a denial of service
  (system crash) via a crafted UDF filesystem image (bsc#933904).
* CVE-2014-9731: The UDF filesystem implementation in the Linux kernel
  before 3.18.2 did not ensure that space is available for storing a
  symlink target's name along with a trailing \0 character, which allowed
  local users to obtain sensitive information via a crafted filesystem
  image, related to fs/udf/symlink.c and fs/udf/unicode.c (bsc#933896).

The following non-security bugs were fixed:
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942350).
- Btrfs: be aware of btree inode write errors to avoid fs corruption
  (bnc#942404).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942350).
- Btrfs: check if previous transaction aborted to avoid fs corruption (bnc#942404).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942350).
- Btrfs: deal with convert_extent_bit errors to avoid fs corruption (bnc#942404).
- Btrfs: fix hang when failing to submit bio of directIO (bnc#942688).
- Btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942688).
- Btrfs: fix put dio bio twice when we submit dio bio fail (bnc#942688).
- DRM/I915: Add enum hpd_pin to intel_encoder (bsc#942938).
- DRM/i915: Convert HPD interrupts to make use of HPD pin assignment in encoders (v2) (bsc#942938).
- DRM/i915: Get rid of the 'hotplug_supported_mask' in struct drm_i915_private (bsc#942938).
- DRM/i915: Remove i965_hpd_irq_setup (bsc#942938).
- DRM/i915: Remove valleyview_hpd_irq_setup (bsc#942938).
- Ext4: handle SEEK_HOLE/SEEK_DATA generically (bsc#934944).
- IB/core: Fix mismatch between locked and pinned pages (bnc#937855).
- IB/iser: Add Discovery support (bsc#923002).
- IB/iser: Move informational messages from error to info level (bsc#923002).
- NFS: never queue requests with rq_cong set on the sending queue (bsc#932458).
- NFSD: Fix nfsv4 opcode decoding error (bsc#935906).
- NFSv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error (bsc#939910).
- PCI: Disable Bus Master only on kexec reboot (bsc#920110).
- PCI: Disable Bus Master unconditionally in pci_device_shutdown() (bsc#920110).
- PCI: Do not try to disable Bus Master on disconnected PCI devices (bsc#920110).
- PCI: Lock down register access when trusted_kernel is true (fate#314486, bnc#884333)(bsc#923431).
- PCI: disable Bus Master on PCI device shutdown (bsc#920110).
- USB: xhci: Reset a halted endpoint immediately when we encounter a stall (bnc#933721).
- USB: xhci: do not start a halted endpoint before its new dequeue is set (bnc#933721).
- Apparmor: fix file_permission if profile is updated (bsc#917968).
- block: Discard bios do not have data (bsc#928988).
- cifs: Fix missing crypto allocation (bnc#937402).
- drm/cirrus: do not attempt to acquire a reservation while in an interrupt handler (bsc#935572).
- drm/i915: (re)init HPD interrupt storm statistics (bsc#942938).
- drm/i915: Add HPD IRQ storm detection (v5) (bsc#942938).
- drm/i915: Add Reenable Timer to turn Hotplug Detection back on (v4) (bsc#942938).
- drm/i915: Add bit field to record which pins have received HPD events (v3) (bsc#942938).
- drm/i915: Add messages useful for HPD storm detection debugging (v2) (bsc#942938).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt (bsc#942938).
- drm/i915: Disable HPD interrupt on pin when irq storm is detected (v3) (bsc#942938).
- drm/i915: Do not WARN nor handle unexpected hpd interrupts on gmch platforms (bsc#942938).
- drm/i915: Enable hotplug interrupts after querying hw capabilities (bsc#942938).
- drm/i915: Fix hotplug interrupt enabling for SDVOC (bsc#942938).
- drm/i915: Fix up sdvo hpd pins for i965g/gm (bsc#942938).
- drm/i915: Make hpd arrays big enough to avoid out of bounds access (bsc#942938).
- drm/i915: Mask out the HPD irq bits before setting them individually (bsc#942938).
- drm/i915: Only print hotplug event message when hotplug bit is set (bsc#942938).
- drm/i915: Only reprobe display on encoder which has received an HPD event (v2) (bsc#942938).
- drm/i915: Queue reenable timer also when enable_hotplug_processing is false (bsc#942938).
- drm/i915: Remove pch_rq_mask from struct drm_i915_private (bsc#942938).
- drm/i915: Use an interrupt save spinlock in intel_hpd_irq_handler() (bsc#942938).
- drm/i915: WARN_ONCE() about unexpected interrupts for all chipsets (bsc#942938).
- drm/i915: assert_spin_locked for pipestat interrupt enable/disable (bsc#942938).
- drm/i915: clear crt hotplug compare voltage field before setting (bsc#942938).
- drm/i915: close tiny race in the ilk pcu even interrupt setup (bsc#942938).
- drm/i915: fix hotplug event bit tracking (bsc#942938).
- drm/i915: fix hpd interrupt register locking (bsc#942938).
- drm/i915: fix hpd work vs. flush_work in the pageflip code deadlock (bsc#942938).
- drm/i915: fix locking around ironlake_enable|disable_display_irq (bsc#942938).
- drm/i915: fold the hpd_irq_setup call into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the no-irq check into intel_hpd_irq_handler (bsc#942938).
- drm/i915: fold the queue_work into intel_hpd_irq_handler (bsc#942938).
- drm/i915: implement ibx_hpd_irq_setup (bsc#942938).
- drm/i915: s/hotplug_irq_storm_detect/intel_hpd_irq_handler/ (bsc#942938).
- drm/mgag200: Do not do full cleanup if mgag200_device_init fails (FATE#317582).
- drm/mgag200: do not attempt to acquire a reservation while in an interrupt handler (FATE#317582).
- drm: ast,cirrus,mgag200: use drm_can_sleep (FATE#317582, bnc#883380, bsc#935572).
- ehci-pci: enable interrupt on BayTrail (bnc926007).
- exec: kill the unnecessary mm-&gt;def_flags setting in load_elf_binary() (fate#317831,bnc#891116)).
- ext3: Fix data corruption in inodes with journalled data (bsc#936637). 
- fanotify: Fix deadlock with permission events (bsc#935053).
- fork: reset mm-&gt;pinned_vm (bnc#937855).
- hrtimer: prevent timer interrupt DoS (bnc#886785).
- hugetlb, kabi: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hugetlb: do not account hugetlb pages as NR_FILE_PAGES (bnc#930092).
- hv_storvsc: use small sg_tablesize on x86 (bnc#937256).
- ibmveth: Add GRO support (bsc#935055).
- ibmveth: Add support for Large Receive Offload (bsc#935055).
- ibmveth: Add support for TSO (bsc#935055).
- ibmveth: add support for TSO6.
- ibmveth: change rx buffer default allocation for CMO (bsc#935055).
- igb: do not reuse pages with pfmemalloc flag fix (bnc#920016).
- inotify: Fix nested sleeps in inotify_read() (bsc#940925).
- iommu/amd: Fix memory leak in free_pagetable (bsc#935866).
- iommu/amd: Handle large pages correctly in free_pagetable (bsc#935866).
- ipv6: probe routes asynchronous in rt6_probe (bsc#936118).
- ixgbe: Use pci_vfs_assigned instead of ixgbe_vfs_are_assigned (bsc#927355).
- kabi: wrapper include file with __GENKSYMS__ check to avoid kabi change (bsc920110).
- kdump: fix crash_kexec()/smp_send_stop() race in panic() (bnc#937444).
- kernel: add panic_on_warn.
- kernel: do full redraw of the 3270 screen on reconnect (bnc#943477, LTC#129509).
- kvm: irqchip: Break up high order allocations of kvm_irq_routing_table (bnc#926953).
- libata: prevent HSM state change race between ISR and PIO (bsc#923245).
- libiscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- md: use kzalloc() when bitmap is disabled (bsc#939994).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#894936).
- megaraid_sas: Use correct reset sequence in adp_reset() (bsc#938485).
- mlx4: Check for assigned VFs before disabling SR-IOV (bsc#927355).
- mm, THP: do not hold mmap_sem in khugepaged when allocating THP (VM Performance).
- mm, mempolicy: remove duplicate code (VM Functionality, bnc#931620).
- mm, thp: fix collapsing of hugepages on madvise (VM Functionality).
- mm, thp: only collapse hugepages to nodes with affinity for zone_reclaim_mode (VM Functionality, bnc#931620).
- mm, thp: really limit transparent hugepage allocation to local node (VM Performance, bnc#931620).
- mm, thp: respect MPOL_PREFERRED policy with non-local node (VM Performance, bnc#931620).
- mm/hugetlb: check for pte NULL pointer in __page_check_address() (bnc#929143).
- mm/mempolicy.c: merge alloc_hugepage_vma to alloc_pages_vma (VM Performance, bnc#931620).
- mm/thp: allocate transparent hugepages on local node (VM Performance, bnc#931620).
- mm: make page pfmemalloc check more robust (bnc#920016).
- mm: restrict access to slab files under procfs and sysfs (bnc#936077).
- mm: thp: khugepaged: add policy for finding target node (VM Functionality, bnc#931620).
- net/mlx4_core: Do not disable SRIOV if there are active VFs (bsc#927355).
- net: Fix 'ip rule delete table 256' (bsc#873385).
- net: fib6: fib6_commit_metrics: fix potential NULL pointer dereference (bsc#867362).
- net: ipv6: fib: do not sleep inside atomic lock (bsc#867362).
- netfilter: nf_conntrack_proto_sctp: minimal multihoming support (bsc#932350).
- nfsd: support disabling 64bit dir cookies (bnc#937503).
- pagecache limit: Do not skip over small zones that easily (bnc#925881).
- pagecache limit: add tracepoints (bnc#924701).
- pagecache limit: export debugging counters via /proc/vmstat (bnc#924701).
- pagecache limit: fix wrong nr_reclaimed count (FATE#309111, bnc#924701).
- pagecache limit: reduce starvation due to reclaim retries (bnc#925903).
- pci: Add SRIOV helper function to determine if VFs are assigned to guest (bsc#927355).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- pci: Add flag indicating device has been assigned by KVM (bnc#777565 FATE#313819).
- perf, nmi: Fix unknown NMI warning (bsc#929142).
- perf/x86/intel: Move NMI clearing to end of PMI handler (bsc#929142).
- qlcnic: Fix NULL pointer dereference in qlcnic_hwmon_show_temp() (bsc#936095).
- r8169: remember WOL preferences on driver load (bsc#942305).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- sched: fix __sched_setscheduler() vs load balancing race (bnc#921430)
- scsi: Correctly set the scsi host/msg/status bytes (bnc#933936).
- scsi: fix scsi_error_handler vs. scsi_host_dev_release race (bnc#942204).
- scsi: Moved iscsi kabi patch to patches.kabi (bsc#923002)
- scsi: Set hostbyte status in scsi_check_sense() (bsc#920733).
- scsi: kabi: allow iscsi disocvery session support (bsc#923002).
- scsi: vmw_pvscsi: Fix pvscsi_abort() function (bnc#940398 bsc#930934).
- scsi_error: add missing case statements in scsi_decide_disposition() (bsc#920733).
- scsi_transport_iscsi: Exporting new attrs for iscsi session and connection in sysfs (bsc#923002).
- sg_start_req(): make sure that there's not too many elements in iovec (bsc#940338).
- st: null pointer dereference panic caused by use after kref_put by st_open (bsc#936875).
- supported.conf: enable sch_mqprio (bsc#932882)
- udf: Remove repeated loads blocksize (bsc#933907).
- usb: core: Fix USB 3.0 devices lost in NOTATTACHED state after a hub port reset (bnc#937641).
- usb: xhci: Prefer endpoint context dequeue pointer over stopped_trb (bnc#933721).
- usb: xhci: handle Config Error Change (CEC) in xhci driver (bnc#933721).
- vmxnet3: Bump up driver version number (bsc#936423).
- vmxnet3: Changes for vmxnet3 adapter version 2 (fwd) (bug#936423).
- vmxnet3: Fix memory leaks in rx path (fwd) (bug#936423).
- vmxnet3: Register shutdown handler for device (fwd) (bug#936423).
- x86, tls, ldt: Stop checking lm in LDT_empty (bsc#920250).
- x86, tls: Interpret an all-zero struct user_desc as 'no segment' (bsc#920250).
- x86-64: Do not apply destructive erratum workaround on unaffected CPUs (bsc#929076).
- x86/mm: Improve AMD Bulldozer ASLR workaround (bsc#937032).
- x86/tsc: Change Fast TSC calibration failed from error to info (bnc#942605).
- xenbus: add proper handling of XS_ERROR from Xenbus for transactions.
- xfs: fix problem when using md+XFS under high load (bnc#925705).
- xhci: Allocate correct amount of scratchpad buffers (bnc#933721).
- xhci: Do not enable/disable RWE on bus suspend/resume (bnc#933721).
- xhci: Solve full event ring by increasing TRBS_PER_SEGMENT to 256 (bnc#933721).
- xhci: Treat not finding the event_seg on COMP_STOP the same as COMP_STOP_INVAL (bnc#933721).
- xhci: Workaround for PME stuck issues in Intel xhci (bnc#933721).
- xhci: do not report PLC when link is in internal resume state (bnc#933721).
- xhci: fix reporting of 0-sized URBs in control endpoint (bnc#933721).
- xhci: report U3 when link is in resume state (bnc#933721).
- xhci: rework cycle bit checking for new dequeue pointers (bnc#933721).
- zcrypt: Fixed reset and interrupt handling of AP queues (bnc#936921, bnc#936925, LTC#126491).		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-08"/>
	<updated date="2015-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/777565">SUSE bug 777565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867362">SUSE bug 867362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873385">SUSE bug 873385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883380">SUSE bug 883380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884333">SUSE bug 884333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886785">SUSE bug 886785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891116">SUSE bug 891116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894936">SUSE bug 894936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917968">SUSE bug 917968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919463">SUSE bug 919463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920016">SUSE bug 920016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920110">SUSE bug 920110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920250">SUSE bug 920250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920733">SUSE bug 920733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921430">SUSE bug 921430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923002">SUSE bug 923002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923245">SUSE bug 923245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923431">SUSE bug 923431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924701">SUSE bug 924701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925705">SUSE bug 925705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925881">SUSE bug 925881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925903">SUSE bug 925903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926240">SUSE bug 926240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926953">SUSE bug 926953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927355">SUSE bug 927355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928988">SUSE bug 928988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929076">SUSE bug 929076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929142">SUSE bug 929142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929143">SUSE bug 929143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930092">SUSE bug 930092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930934">SUSE bug 930934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931620">SUSE bug 931620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932350">SUSE bug 932350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932458">SUSE bug 932458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932882">SUSE bug 932882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933721">SUSE bug 933721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933936">SUSE bug 933936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934944">SUSE bug 934944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935053">SUSE bug 935053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935055">SUSE bug 935055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935572">SUSE bug 935572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935705">SUSE bug 935705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935866">SUSE bug 935866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935906">SUSE bug 935906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936077">SUSE bug 936077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936095">SUSE bug 936095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936118">SUSE bug 936118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936423">SUSE bug 936423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936637">SUSE bug 936637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936831">SUSE bug 936831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936875">SUSE bug 936875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936921">SUSE bug 936921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936925">SUSE bug 936925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937032">SUSE bug 937032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937402">SUSE bug 937402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937503">SUSE bug 937503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937641">SUSE bug 937641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937855">SUSE bug 937855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938485">SUSE bug 938485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939910">SUSE bug 939910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939994">SUSE bug 939994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940338">SUSE bug 940338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940398">SUSE bug 940398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940925">SUSE bug 940925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940966">SUSE bug 940966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942204">SUSE bug 942204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942305">SUSE bug 942305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942350">SUSE bug 942350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942367">SUSE bug 942367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942404">SUSE bug 942404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942605">SUSE bug 942605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942688">SUSE bug 942688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943477">SUSE bug 943477</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2150/">CVE-2015-2150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2830/">CVE-2015-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4700/">CVE-2015-4700</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5364/">CVE-2015-5364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5366/">CVE-2015-5366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5707/">CVE-2015-5707</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6252/">CVE-2015-6252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567338" comment="kernel-default-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567339" comment="kernel-default-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567340" comment="kernel-default-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567341" comment="kernel-default-extra-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567342" comment="kernel-pae-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567343" comment="kernel-pae-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567344" comment="kernel-pae-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567345" comment="kernel-pae-extra-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567346" comment="kernel-source-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567347" comment="kernel-syms-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567348" comment="kernel-trace-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567349" comment="kernel-xen-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567350" comment="kernel-xen-base-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567351" comment="kernel-xen-devel-3.0.101-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567352" comment="kernel-xen-extra-3.0.101-65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78569" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="758040" ref_url="https://bugzilla.suse.com/758040" source="BUGZILLA"/>
		<reference ref_id="904035" ref_url="https://bugzilla.suse.com/904035" source="BUGZILLA"/>
		<reference ref_id="912738" ref_url="https://bugzilla.suse.com/912738" source="BUGZILLA"/>
		<reference ref_id="915183" ref_url="https://bugzilla.suse.com/915183" source="BUGZILLA"/>
		<reference ref_id="924919" ref_url="https://bugzilla.suse.com/924919" source="BUGZILLA"/>
		<reference ref_id="933782" ref_url="https://bugzilla.suse.com/933782" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="942082" ref_url="https://bugzilla.suse.com/942082" source="BUGZILLA"/>
		<reference ref_id="947128" ref_url="https://bugzilla.suse.com/947128" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="951392" ref_url="https://bugzilla.suse.com/951392" source="BUGZILLA"/>
		<reference ref_id="951815" ref_url="https://bugzilla.suse.com/951815" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953369" ref_url="https://bugzilla.suse.com/953369" source="BUGZILLA"/>
		<reference ref_id="954992" ref_url="https://bugzilla.suse.com/954992" source="BUGZILLA"/>
		<reference ref_id="955308" ref_url="https://bugzilla.suse.com/955308" source="BUGZILLA"/>
		<reference ref_id="955654" ref_url="https://bugzilla.suse.com/955654" source="BUGZILLA"/>
		<reference ref_id="955837" ref_url="https://bugzilla.suse.com/955837" source="BUGZILLA"/>
		<reference ref_id="955925" ref_url="https://bugzilla.suse.com/955925" source="BUGZILLA"/>
		<reference ref_id="956084" ref_url="https://bugzilla.suse.com/956084" source="BUGZILLA"/>
		<reference ref_id="956375" ref_url="https://bugzilla.suse.com/956375" source="BUGZILLA"/>
		<reference ref_id="956514" ref_url="https://bugzilla.suse.com/956514" source="BUGZILLA"/>
		<reference ref_id="956708" ref_url="https://bugzilla.suse.com/956708" source="BUGZILLA"/>
		<reference ref_id="956949" ref_url="https://bugzilla.suse.com/956949" source="BUGZILLA"/>
		<reference ref_id="957986" ref_url="https://bugzilla.suse.com/957986" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="957990" ref_url="https://bugzilla.suse.com/957990" source="BUGZILLA"/>
		<reference ref_id="958000" ref_url="https://bugzilla.suse.com/958000" source="BUGZILLA"/>
		<reference ref_id="958463" ref_url="https://bugzilla.suse.com/958463" source="BUGZILLA"/>
		<reference ref_id="958886" ref_url="https://bugzilla.suse.com/958886" source="BUGZILLA"/>
		<reference ref_id="958906" ref_url="https://bugzilla.suse.com/958906" source="BUGZILLA"/>
		<reference ref_id="958912" ref_url="https://bugzilla.suse.com/958912" source="BUGZILLA"/>
		<reference ref_id="958951" ref_url="https://bugzilla.suse.com/958951" source="BUGZILLA"/>
		<reference ref_id="959190" ref_url="https://bugzilla.suse.com/959190" source="BUGZILLA"/>
		<reference ref_id="959312" ref_url="https://bugzilla.suse.com/959312" source="BUGZILLA"/>
		<reference ref_id="959399" ref_url="https://bugzilla.suse.com/959399" source="BUGZILLA"/>
		<reference ref_id="959649" ref_url="https://bugzilla.suse.com/959649" source="BUGZILLA"/>
		<reference ref_id="959705" ref_url="https://bugzilla.suse.com/959705" source="BUGZILLA"/>
		<reference ref_id="961500" ref_url="https://bugzilla.suse.com/961500" source="BUGZILLA"/>
		<reference ref_id="961509" ref_url="https://bugzilla.suse.com/961509" source="BUGZILLA"/>
		<reference ref_id="961516" ref_url="https://bugzilla.suse.com/961516" source="BUGZILLA"/>
		<reference ref_id="961658" ref_url="https://bugzilla.suse.com/961658" source="BUGZILLA"/>
		<reference ref_id="962965" ref_url="https://bugzilla.suse.com/962965" source="BUGZILLA"/>
		<reference ref_id="963276" ref_url="https://bugzilla.suse.com/963276" source="BUGZILLA"/>
		<reference ref_id="963561" ref_url="https://bugzilla.suse.com/963561" source="BUGZILLA"/>
		<reference ref_id="963765" ref_url="https://bugzilla.suse.com/963765" source="BUGZILLA"/>
		<reference ref_id="963767" ref_url="https://bugzilla.suse.com/963767" source="BUGZILLA"/>
		<reference ref_id="964201" ref_url="https://bugzilla.suse.com/964201" source="BUGZILLA"/>
		<reference ref_id="964818" ref_url="https://bugzilla.suse.com/964818" source="BUGZILLA"/>
		<reference ref_id="966094" ref_url="https://bugzilla.suse.com/966094" source="BUGZILLA"/>
		<reference ref_id="966137" ref_url="https://bugzilla.suse.com/966137" source="BUGZILLA"/>
		<reference ref_id="966437" ref_url="https://bugzilla.suse.com/966437" source="BUGZILLA"/>
		<reference ref_id="966693" ref_url="https://bugzilla.suse.com/966693" source="BUGZILLA"/>
		<reference ref_id="967042" ref_url="https://bugzilla.suse.com/967042" source="BUGZILLA"/>
		<reference ref_id="967972" ref_url="https://bugzilla.suse.com/967972" source="BUGZILLA"/>
		<reference ref_id="967973" ref_url="https://bugzilla.suse.com/967973" source="BUGZILLA"/>
		<reference ref_id="967974" ref_url="https://bugzilla.suse.com/967974" source="BUGZILLA"/>
		<reference ref_id="967975" ref_url="https://bugzilla.suse.com/967975" source="BUGZILLA"/>
		<reference ref_id="968011" ref_url="https://bugzilla.suse.com/968011" source="BUGZILLA"/>
		<reference ref_id="968012" ref_url="https://bugzilla.suse.com/968012" source="BUGZILLA"/>
		<reference ref_id="968013" ref_url="https://bugzilla.suse.com/968013" source="BUGZILLA"/>
		<reference ref_id="969307" ref_url="https://bugzilla.suse.com/969307" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446/" source="CVE"/>
		<reference ref_id="CVE-2015-7515" ref_url="https://www.suse.com/security/cve/CVE-2015-7515/" source="CVE"/>
		<reference ref_id="CVE-2015-7550" ref_url="https://www.suse.com/security/cve/CVE-2015-7550/" source="CVE"/>
		<reference ref_id="CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551/" source="CVE"/>
		<reference ref_id="CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552/" source="CVE"/>
		<reference ref_id="CVE-2015-8569" ref_url="https://www.suse.com/security/cve/CVE-2015-8569/" source="CVE"/>
		<reference ref_id="CVE-2015-8575" ref_url="https://www.suse.com/security/cve/CVE-2015-8575/" source="CVE"/>
		<reference ref_id="CVE-2015-8767" ref_url="https://www.suse.com/security/cve/CVE-2015-8767/" source="CVE"/>
		<reference ref_id="CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785/" source="CVE"/>
		<reference ref_id="CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812/" source="CVE"/>
		<reference ref_id="CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723/" source="CVE"/>
		<reference ref_id="CVE-2016-2069" ref_url="https://www.suse.com/security/cve/CVE-2016-2069/" source="CVE"/>
		<reference ref_id="CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384/" source="CVE"/>
		<reference ref_id="CVE-2016-2543" ref_url="https://www.suse.com/security/cve/CVE-2016-2543/" source="CVE"/>
		<reference ref_id="CVE-2016-2544" ref_url="https://www.suse.com/security/cve/CVE-2016-2544/" source="CVE"/>
		<reference ref_id="CVE-2016-2545" ref_url="https://www.suse.com/security/cve/CVE-2016-2545/" source="CVE"/>
		<reference ref_id="CVE-2016-2546" ref_url="https://www.suse.com/security/cve/CVE-2016-2546/" source="CVE"/>
		<reference ref_id="CVE-2016-2547" ref_url="https://www.suse.com/security/cve/CVE-2016-2547/" source="CVE"/>
		<reference ref_id="CVE-2016-2548" ref_url="https://www.suse.com/security/cve/CVE-2016-2548/" source="CVE"/>
		<reference ref_id="CVE-2016-2549" ref_url="https://www.suse.com/security/cve/CVE-2016-2549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Following feature was added to kernel-xen:
- A improved XEN blkfront module was added, which allows more I/O bandwidth. (FATE#320200)
  It is called xen-blkfront in PV, and xen-vbd-upstream in HVM mode.

The following security bugs were fixed:
- CVE-2013-7446: Use-after-free vulnerability in net/unix/af_unix.c in
  the Linux kernel allowed local users to bypass intended AF_UNIX socket
  permissions or cause a denial of service (panic) via crafted epoll_ctl
  calls (bnc#955654).
- CVE-2015-7515: An out of bounds memory access in the aiptek USB
  driver could be used by physical local attackers to crash the kernel
  (bnc#956708).
- CVE-2015-7550: The keyctl_read_key function in security/keys/keyctl.c
  in the Linux kernel did not properly use a semaphore, which allowed
  local users to cause a denial of service (NULL pointer dereference and
  system crash) or possibly have unspecified other impact via a crafted
  application that leverages a race condition between keyctl_revoke and
  keyctl_read calls (bnc#958951).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed
  local users to gain privileges or cause a denial of service (BUG)
  via crafted keyctl commands that negatively instantiate a key, related
  to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c,
  and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8543: The networking implementation in the Linux kernel
  did not validate protocol identifiers for certain protocol families,
  which allowed local users to cause a denial of service (NULL function
  pointer dereference and system crash) or possibly gain privileges by
  leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application
  (bnc#958886).
- CVE-2015-8550: Compiler optimizations in the XEN PV backend drivers
  could have lead to double fetch vulnerabilities, causing denial of service
  or arbitrary code execution (depending on the configuration) (bsc#957988).
- CVE-2015-8551, CVE-2015-8552: xen/pciback: For
  XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X) enabled
  (bsc#957990).
- CVE-2015-8569: The (1) pptp_bind and (2) pptp_connect functions in
  drivers/net/ppp/pptp.c in the Linux kernel did not verify an address
  length, which allowed local users to obtain sensitive information from
  kernel memory and bypass the KASLR protection mechanism via a crafted
  application (bnc#959190).
- CVE-2015-8575: The sco_sock_bind function in net/bluetooth/sco.c in the
  Linux kernel did not verify an address length, which allowed local users
  to obtain sensitive information from kernel memory and bypass the KASLR
  protection mechanism via a crafted application (bnc#959190 bnc#959399).
- CVE-2015-8767: net/sctp/sm_sideeffect.c in the Linux kernel did not
  properly manage the relationship between a lock and a socket, which
  allowed local users to cause a denial of service (deadlock) via a crafted
  sctp_accept call (bnc#961509).
- CVE-2015-8785: The fuse_fill_write_pages function in fs/fuse/file.c
  in the Linux kernel allowed local users to cause a denial of service
  (infinite loop) via a writev system call that triggers a zero length
  for the first segment of an iov (bnc#963765).
- CVE-2015-8812: A use-after-free flaw was found in the CXGB3 kernel
  driver when the network was considered to be congested. This could be
  used by local attackers to cause machine crashes or potentially code
  execution (bsc#966437).
- CVE-2016-0723: Race condition in the tty_ioctl function in
  drivers/tty/tty_io.c in the Linux kernel allowed local users to obtain
  sensitive information from kernel memory or cause a denial of service
  (use-after-free and system crash) by making a TIOCGETD ioctl call during
  processing of a TIOCSETD ioctl call (bnc#961500).
- CVE-2016-2069: Race conditions in TLB syncing was fixed which could
  leak to information leaks (bnc#963767).
- CVE-2016-2384: Removed a double free in the ALSA usb-audio driver in
  the umidi object which could lead to crashes (bsc#966693).
- CVE-2016-2543: Added a missing NULL check at remove_events ioctl in
  ALSA that could lead to crashes. (bsc#967972).
- CVE-2016-2544, CVE-2016-2545, CVE-2016-2546, CVE-2016-2547,
  CVE-2016-2548, CVE-2016-2549: Various race conditions in ALSAs timer
  handling were fixed. (bsc#967975, bsc#967974, bsc#967973, bsc#968011,
  bsc#968012, bsc#968013).

The following non-security bugs were fixed:
- alsa: hda - Add one more node in the EAPD supporting candidate list (bsc#963561).
- alsa: hda - Apply clock gate workaround to Skylake, too (bsc#966137).
- alsa: hda - Fix playback noise with 24/32 bit sample size on BXT (bsc#966137).
- alsa: hda - disable dynamic clock gating on Broxton before reset (bsc#966137).
- Add /etc/modprobe.d/50-xen.conf selecting Xen frontend driver implementation (bsc#957986, bsc#956084, bsc#961658).
- Fix handling of re-write-before-commit for mmapped NFS pages (bsc#964201).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514).
- nvme: default to 4k device page size (bsc#967042).
- pci: leave MEM and IO decoding disabled during 64-bit BAR sizing, too (bsc#951815).
- Refresh patches.xen/xen3-08-x86-ldt-make-modify_ldt-synchronous.patch (bsc#959705).
- Refresh patches.xen/xen-vscsi-large-requests (refine fix and also address bsc#966094).
- sunrpc: restore fair scheduling to priority queues (bsc#955308).
- usb: ftdi_sio: fix race condition in TIOCMIWAIT, and abort of TIOCMIWAIT when the device is removed (bnc#956375).
- usb: ftdi_sio: fix status line change handling for TIOCMIWAIT and TIOCGICOUNT (bnc#956375).
- usb: ftdi_sio: fix tiocmget and tiocmset return values (bnc#956375).
- usb: ftdi_sio: fix tiocmget indentation (bnc#956375).
- usb: ftdi_sio: optimise chars_in_buffer (bnc#956375).
- usb: ftdi_sio: refactor modem-control status retrieval (bnc#956375).
- usb: ftdi_sio: remove unnecessary memset (bnc#956375).
- usb: ftdi_sio: use ftdi_get_modem_status in chars_in_buffer (bnc#956375).
- usb: ftdi_sio: use generic chars_in_buffer (bnc#956375).
- usb: pl2303: clean up line-status handling (bnc#959649).
- usb: pl2303: only wake up MSR queue on changes (bnc#959649).
- usb: pl2303: remove bogus delta_msr_wait wake up (bnc#959649).
- usb: serial: export usb_serial_generic_chars_in_buffer (bnc#956375).
- Update patches.fixes/mm-exclude-reserved-pages-from-dirtyable-memory-fix.patch (bnc#940017, bnc#949298, bnc#947128).
- xen: Update Xen config files (enable upstream block frontend).
- ec2: Update kabi files and start tracking ec2
- xen: consolidate and simplify struct xenbus_driver instantiation (bsc#961658 fate#320200).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- block: Always check queue limits for cloned requests (bsc#933782).
- block: xen-blkfront: Fix possible NULL ptr dereference (bsc#961658 fate#320200).
- bnx2x: Add new device ids under the Qlogic vendor (bsc#964818).
- bnx2x: Alloc 4k fragment for each rx ring buffer element (bsc#953369).
- bnx2x: fix DMA API usage (bsc#953369).
- driver core: Add BUS_NOTIFY_REMOVED_DEVICE event (bnc#962965).
- driver: xen-blkfront: move talk_to_blkback to a more suitable place (bsc#961658 fate#320200).
- drivers: xen-blkfront: only talk_to_blkback() when in XenbusStateInitialising (bsc#961658 fate#320200).
- drm/i915: Change semantics of hw_contexts_disabled (bsc#963276).
- drm/i915: Evict CS TLBs between batches (bsc#758040).
- drm/i915: Fix SRC_COPY width on 830/845g (bsc#758040).
- e1000e: Do not read ICR in Other interrupt (bsc#924919).
- e1000e: Do not write lsc to ics in msi-x mode (bsc#924919).
- e1000e: Fix msi-x interrupt automask (bsc#924919).
- e1000e: Remove unreachable code (bsc#924919).
- ext3: NULL dereference in ext3_evict_inode() (bsc#942082).
- ext3: fix data=journal fast mount/umount hang (bsc#942082).
- firmware: Create directories for external firmware (bsc#959312).
- firmware: Simplify directory creation (bsc#959312).
- ftdi_sio: private backport of TIOCMIWAIT (bnc#956375).
- iommu/vt-d: Do not change dma domain on dma-mask change (bsc#955925).
- jbd: Fix unreclaimed pages after truncate in data=journal mode (bsc#961516).
- kabi/severities: Add exception for bnx2x_schedule_sp_rtnl() There is no external, 3rd party modules use the symbol and the bnx2x_schedule_sp_rtnl symbol is only used in the bnx2x driver. (bsc#953369)
- kbuild: create directory for dir/file.o (bsc#959312).
- llist/xen-blkfront: implement safe version of llist_for_each_entry (bsc#961658 fate#320200).
- lpfc: Fix null ndlp dereference in target_reset_handler (bsc#951392).
- mm-memcg-print-statistics-from-live-counters-fix (bnc#969307).
- nvme: Clear BIO_SEG_VALID flag in nvme_bio_split() (bsc#954992).
- pci: Update VPD size with correct length (bsc#958906).
- pl2303: fix TIOCMIWAIT (bnc#959649).
- pl2303: introduce private disconnect method (bnc#959649).
- qeth: initialize net_device with carrier off (bnc#958000, LTC#136514).
- s390/cio: collect format 1 channel-path description data (bnc#958000, LTC#136434).
- s390/cio: ensure consistent measurement state (bnc#958000, LTC#136434).
- s390/cio: fix measurement characteristics memleak (bnc#958000, LTC#136434).
- s390/cio: update measurement characteristics (bnc#958000, LTC#136434).
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/sclp: Determine HSA size dynamically for zfcpdump (bnc#958000, LTC#136143).
- s390/sclp: Move declarations for sclp_sdias into separate header file (bnc#958000, LTC#136143).
- scsi_dh_rdac: always retry MODE SELECT on command lock violation (bsc#956949).
- supported.conf: Add xen-blkfront.
- tg3: 5715 does not link up when autoneg off (bsc#904035).
- usb: serial: ftdi_sio: Add missing chars_in_buffer function (bnc#956375).
- vmxnet3: fix building without CONFIG_PCI_MSI (bsc#958912).
- vmxnet3: fix netpoll race condition (bsc#958912).
- xen, blkfront: factor out flush-related checks from do_blkif_request() (bsc#961658 fate#320200).
- xen-blkfront: Handle discard requests (bsc#961658 fate#320200).
- xen-blkfront: If no barrier or flush is supported, use invalid operation (bsc#961658 fate#320200).
- xen-blkfront: Introduce a 'max' module parameter to alter the amount of indirect segments (bsc#961658 fate#320200).
- xen-blkfront: Silence pfn maybe-uninitialized warning (bsc#961658 fate#320200).
- xen-blkfront: allow building in our Xen environment (bsc#961658 fate#320200).
- xen-blkfront: check for null drvdata in blkback_changed (XenbusStateClosing) (bsc#961658 fate#320200).
- xen-blkfront: do not add indirect pages to list when !feature_persistent (bsc#961658 fate#320200).
- xen-blkfront: drop the use of llist_for_each_entry_safe (bsc#961658 fate#320200).
- xen-blkfront: fix a deadlock while handling discard response (bsc#961658 fate#320200).
- xen-blkfront: fix accounting of reqs when migrating (bsc#961658 fate#320200).
- xen-blkfront: free allocated page (bsc#961658 fate#320200).
- xen-blkfront: handle backend CLOSED without CLOSING (bsc#961658 fate#320200).
- xen-blkfront: handle bvecs with partial data (bsc#961658 fate#320200).
- xen-blkfront: improve aproximation of required grants per request (bsc#961658 fate#320200).
- xen-blkfront: make blkif_io_lock spinlock per-device (bsc#961658 fate#320200).
- xen-blkfront: plug device number leak in xlblk_init() error path (bsc#961658 fate#320200).
- xen-blkfront: pre-allocate pages for requests (bsc#961658 fate#320200).
- xen-blkfront: remove frame list from blk_shadow (bsc#961658 fate#320200).
- xen-blkfront: remove type check from blkfront_setup_discard (bsc#961658 fate#320200).
- xen-blkfront: restore the non-persistent data path (bsc#961658 fate#320200).
- xen-blkfront: revoke foreign access for grants not mapped by the backend (bsc#961658 fate#320200).
- xen-blkfront: set blk_queue_max_hw_sectors correctly (bsc#961658 fate#320200).
- xen-blkfront: switch from llist to list (bsc#961658 fate#320200).
- xen-blkfront: use a different scatterlist for each request (bsc#961658 fate#320200).
- xen-block: implement indirect descriptors (bsc#961658 fate#320200).
- xen/blk[front|back]: Enhance discard support with secure erasing support (bsc#961658 fate#320200).
- xen/blk[front|back]: Squash blkif_request_rw and blkif_request_discard together (bsc#961658 fate#320200).
- xen/blkback: Persistent grant maps for xen blk drivers (bsc#961658 fate#320200).
- xen/blkback: persistent-grants fixes (bsc#961658 fate#320200).
- xen/blkfront: Fix crash if backend does not follow the right states (bsc#961658 fate#320200).
- xen/blkfront: do not put bdev right after getting it (bsc#961658 fate#320200).
- xen/blkfront: improve protection against issuing unsupported REQ_FUA (bsc#961658 fate#320200).
- xen/blkfront: remove redundant flush_op (bsc#961658 fate#320200).
- xen/panic/x86: Allow cpus to save registers even if they (bnc#940946).
- xen/panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- xen/pvhvm: If xen_platform_pci=0 is set do not blow up (v4) (bsc#961658 fate#320200).
- xen/x86/mm: Add barriers and document switch_mm()-vs-flush synchronization (bnc#963767).
- xen: x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- xen: x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xfs: Skip dirty pages in -&gt;releasepage (bnc#912738, bnc#915183).
- zfcp: fix fc_host port_type with NPIV (bnc#958000, LTC#132479).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-30"/>
	<updated date="2016-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/758040">SUSE bug 758040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904035">SUSE bug 904035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912738">SUSE bug 912738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915183">SUSE bug 915183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924919">SUSE bug 924919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933782">SUSE bug 933782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942082">SUSE bug 942082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947128">SUSE bug 947128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951392">SUSE bug 951392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951815">SUSE bug 951815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953369">SUSE bug 953369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954992">SUSE bug 954992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955308">SUSE bug 955308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955925">SUSE bug 955925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956084">SUSE bug 956084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956375">SUSE bug 956375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956514">SUSE bug 956514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956708">SUSE bug 956708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956949">SUSE bug 956949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957986">SUSE bug 957986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958000">SUSE bug 958000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958906">SUSE bug 958906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958912">SUSE bug 958912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958951">SUSE bug 958951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959190">SUSE bug 959190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959312">SUSE bug 959312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959399">SUSE bug 959399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959649">SUSE bug 959649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959705">SUSE bug 959705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961509">SUSE bug 961509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961516">SUSE bug 961516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961658">SUSE bug 961658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962965">SUSE bug 962965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963276">SUSE bug 963276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963561">SUSE bug 963561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963767">SUSE bug 963767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964201">SUSE bug 964201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964818">SUSE bug 964818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966094">SUSE bug 966094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966137">SUSE bug 966137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967042">SUSE bug 967042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967972">SUSE bug 967972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967973">SUSE bug 967973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967974">SUSE bug 967974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967975">SUSE bug 967975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968011">SUSE bug 968011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968012">SUSE bug 968012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968013">SUSE bug 968013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969307">SUSE bug 969307</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7515/">CVE-2015-7515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7550/">CVE-2015-7550</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8569/">CVE-2015-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8575/">CVE-2015-8575</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8767/">CVE-2015-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2069/">CVE-2016-2069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2543/">CVE-2016-2543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2544/">CVE-2016-2544</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2545/">CVE-2016-2545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2546/">CVE-2016-2546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2547/">CVE-2016-2547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2548/">CVE-2016-2548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2549/">CVE-2016-2549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567353" comment="kernel-default-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567354" comment="kernel-default-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567355" comment="kernel-default-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567356" comment="kernel-default-extra-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567357" comment="kernel-pae-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567358" comment="kernel-pae-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567359" comment="kernel-pae-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567360" comment="kernel-pae-extra-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567361" comment="kernel-source-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567362" comment="kernel-syms-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567363" comment="kernel-trace-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567364" comment="kernel-xen-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567365" comment="kernel-xen-base-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567366" comment="kernel-xen-devel-3.0.101-71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567367" comment="kernel-xen-extra-3.0.101-71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78570" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="814440" ref_url="https://bugzilla.suse.com/814440" source="BUGZILLA"/>
		<reference ref_id="879378" ref_url="https://bugzilla.suse.com/879378" source="BUGZILLA"/>
		<reference ref_id="879381" ref_url="https://bugzilla.suse.com/879381" source="BUGZILLA"/>
		<reference ref_id="900610" ref_url="https://bugzilla.suse.com/900610" source="BUGZILLA"/>
		<reference ref_id="904348" ref_url="https://bugzilla.suse.com/904348" source="BUGZILLA"/>
		<reference ref_id="904965" ref_url="https://bugzilla.suse.com/904965" source="BUGZILLA"/>
		<reference ref_id="921081" ref_url="https://bugzilla.suse.com/921081" source="BUGZILLA"/>
		<reference ref_id="926774" ref_url="https://bugzilla.suse.com/926774" source="BUGZILLA"/>
		<reference ref_id="930145" ref_url="https://bugzilla.suse.com/930145" source="BUGZILLA"/>
		<reference ref_id="930770" ref_url="https://bugzilla.suse.com/930770" source="BUGZILLA"/>
		<reference ref_id="930788" ref_url="https://bugzilla.suse.com/930788" source="BUGZILLA"/>
		<reference ref_id="930835" ref_url="https://bugzilla.suse.com/930835" source="BUGZILLA"/>
		<reference ref_id="932805" ref_url="https://bugzilla.suse.com/932805" source="BUGZILLA"/>
		<reference ref_id="935123" ref_url="https://bugzilla.suse.com/935123" source="BUGZILLA"/>
		<reference ref_id="935757" ref_url="https://bugzilla.suse.com/935757" source="BUGZILLA"/>
		<reference ref_id="937256" ref_url="https://bugzilla.suse.com/937256" source="BUGZILLA"/>
		<reference ref_id="937444" ref_url="https://bugzilla.suse.com/937444" source="BUGZILLA"/>
		<reference ref_id="938706" ref_url="https://bugzilla.suse.com/938706" source="BUGZILLA"/>
		<reference ref_id="939826" ref_url="https://bugzilla.suse.com/939826" source="BUGZILLA"/>
		<reference ref_id="939926" ref_url="https://bugzilla.suse.com/939926" source="BUGZILLA"/>
		<reference ref_id="939955" ref_url="https://bugzilla.suse.com/939955" source="BUGZILLA"/>
		<reference ref_id="940017" ref_url="https://bugzilla.suse.com/940017" source="BUGZILLA"/>
		<reference ref_id="940913" ref_url="https://bugzilla.suse.com/940913" source="BUGZILLA"/>
		<reference ref_id="940946" ref_url="https://bugzilla.suse.com/940946" source="BUGZILLA"/>
		<reference ref_id="941202" ref_url="https://bugzilla.suse.com/941202" source="BUGZILLA"/>
		<reference ref_id="942938" ref_url="https://bugzilla.suse.com/942938" source="BUGZILLA"/>
		<reference ref_id="943786" ref_url="https://bugzilla.suse.com/943786" source="BUGZILLA"/>
		<reference ref_id="944296" ref_url="https://bugzilla.suse.com/944296" source="BUGZILLA"/>
		<reference ref_id="944677" ref_url="https://bugzilla.suse.com/944677" source="BUGZILLA"/>
		<reference ref_id="944831" ref_url="https://bugzilla.suse.com/944831" source="BUGZILLA"/>
		<reference ref_id="944837" ref_url="https://bugzilla.suse.com/944837" source="BUGZILLA"/>
		<reference ref_id="944989" ref_url="https://bugzilla.suse.com/944989" source="BUGZILLA"/>
		<reference ref_id="944993" ref_url="https://bugzilla.suse.com/944993" source="BUGZILLA"/>
		<reference ref_id="945691" ref_url="https://bugzilla.suse.com/945691" source="BUGZILLA"/>
		<reference ref_id="945825" ref_url="https://bugzilla.suse.com/945825" source="BUGZILLA"/>
		<reference ref_id="945827" ref_url="https://bugzilla.suse.com/945827" source="BUGZILLA"/>
		<reference ref_id="946078" ref_url="https://bugzilla.suse.com/946078" source="BUGZILLA"/>
		<reference ref_id="946214" ref_url="https://bugzilla.suse.com/946214" source="BUGZILLA"/>
		<reference ref_id="946309" ref_url="https://bugzilla.suse.com/946309" source="BUGZILLA"/>
		<reference ref_id="947957" ref_url="https://bugzilla.suse.com/947957" source="BUGZILLA"/>
		<reference ref_id="948330" ref_url="https://bugzilla.suse.com/948330" source="BUGZILLA"/>
		<reference ref_id="948347" ref_url="https://bugzilla.suse.com/948347" source="BUGZILLA"/>
		<reference ref_id="948521" ref_url="https://bugzilla.suse.com/948521" source="BUGZILLA"/>
		<reference ref_id="949100" ref_url="https://bugzilla.suse.com/949100" source="BUGZILLA"/>
		<reference ref_id="949298" ref_url="https://bugzilla.suse.com/949298" source="BUGZILLA"/>
		<reference ref_id="949502" ref_url="https://bugzilla.suse.com/949502" source="BUGZILLA"/>
		<reference ref_id="949706" ref_url="https://bugzilla.suse.com/949706" source="BUGZILLA"/>
		<reference ref_id="949744" ref_url="https://bugzilla.suse.com/949744" source="BUGZILLA"/>
		<reference ref_id="949936" ref_url="https://bugzilla.suse.com/949936" source="BUGZILLA"/>
		<reference ref_id="949981" ref_url="https://bugzilla.suse.com/949981" source="BUGZILLA"/>
		<reference ref_id="950298" ref_url="https://bugzilla.suse.com/950298" source="BUGZILLA"/>
		<reference ref_id="950750" ref_url="https://bugzilla.suse.com/950750" source="BUGZILLA"/>
		<reference ref_id="950998" ref_url="https://bugzilla.suse.com/950998" source="BUGZILLA"/>
		<reference ref_id="951440" ref_url="https://bugzilla.suse.com/951440" source="BUGZILLA"/>
		<reference ref_id="952084" ref_url="https://bugzilla.suse.com/952084" source="BUGZILLA"/>
		<reference ref_id="952384" ref_url="https://bugzilla.suse.com/952384" source="BUGZILLA"/>
		<reference ref_id="952579" ref_url="https://bugzilla.suse.com/952579" source="BUGZILLA"/>
		<reference ref_id="952976" ref_url="https://bugzilla.suse.com/952976" source="BUGZILLA"/>
		<reference ref_id="953527" ref_url="https://bugzilla.suse.com/953527" source="BUGZILLA"/>
		<reference ref_id="953799" ref_url="https://bugzilla.suse.com/953799" source="BUGZILLA"/>
		<reference ref_id="953980" ref_url="https://bugzilla.suse.com/953980" source="BUGZILLA"/>
		<reference ref_id="954404" ref_url="https://bugzilla.suse.com/954404" source="BUGZILLA"/>
		<reference ref_id="954628" ref_url="https://bugzilla.suse.com/954628" source="BUGZILLA"/>
		<reference ref_id="954950" ref_url="https://bugzilla.suse.com/954950" source="BUGZILLA"/>
		<reference ref_id="954984" ref_url="https://bugzilla.suse.com/954984" source="BUGZILLA"/>
		<reference ref_id="955673" ref_url="https://bugzilla.suse.com/955673" source="BUGZILLA"/>
		<reference ref_id="956709" ref_url="https://bugzilla.suse.com/956709" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0272" ref_url="https://www.suse.com/security/cve/CVE-2015-0272/" source="CVE"/>
		<reference ref_id="CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937/" source="CVE"/>
		<reference ref_id="CVE-2015-7509" ref_url="https://www.suse.com/security/cve/CVE-2015-7509/" source="CVE"/>
		<reference ref_id="CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799/" source="CVE"/>
		<reference ref_id="CVE-2015-7872" ref_url="https://www.suse.com/security/cve/CVE-2015-7872/" source="CVE"/>
		<reference ref_id="CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8215" ref_url="https://www.suse.com/security/cve/CVE-2015-8215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.

Following security bugs were fixed:
- CVE-2015-7509: Mounting ext4 filesystems in no-journal mode could hav lead to a system crash (bsc#956709).
- CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel did not ensure that certain slot numbers are valid, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call (bnc#949936).
- CVE-2015-8104: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c (bnc#954404).
- CVE-2015-5307: The KVM subsystem in the Linux kernel allowed guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c (bnc#953527).
- CVE-2015-7990: RDS: There was no verification that an underlying transport exists when creating a connection, causing usage of a NULL pointer (bsc#952384).
- CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel on the x86_64 platform mishandled IRET faults in processing NMIs that occurred during userspace execution, which might have allowed local users to gain privileges by triggering an NMI (bnc#938706).
- CVE-2015-7872: The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allowed local users to cause a denial of service (OOPS) via crafted keyctl commands (bnc#951440).
- CVE-2015-0272: Missing checks allowed remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215 (bnc#944296).
- CVE-2015-6937: The __rds_conn_create function in net/rds/connection.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound (bnc#945825).

The following non-security bugs were fixed:
- ALSA: hda - Disable 64bit address for Creative HDA controllers (bnc#814440).
- Driver: Vmxnet3: Fix ethtool -S to return correct rx queue stats (bsc#950750).
- Drivers: hv: do not do hypercalls when hypercall_page is NULL.
- Drivers: hv: kvp: move poll_channel() to hyperv_vmbus.h.
- Drivers: hv: util: move kvp/vss function declarations to hyperv_vmbus.h.
- Drivers: hv: vmbus: Get rid of some unused definitions.
- Drivers: hv: vmbus: Implement the protocol for tearing down vmbus state.
- Drivers: hv: vmbus: add special crash handler (bnc#930770).
- Drivers: hv: vmbus: add special kexec handler.
- Drivers: hv: vmbus: kill tasklets on module unload.
- Drivers: hv: vmbus: prefer '^A' notification chain to 'panic'.
- Drivers: hv: vmbus: remove hv_synic_free_cpu() call from hv_synic_cleanup().
- Drivers: hv: vmbus: unregister panic notifier on module unload.
- IB/srp: Avoid skipping srp_reset_host() after a transport error (bsc#904965).
- IB/srp: Fix a sporadic crash triggered by cable pulling (bsc#904965).
- KEYS: Fix race between key destruction and finding a keyring by name (bsc#951440).
- Make sure XPRT_CONNECTING gets cleared when needed (bsc#946309).
- NFSv4: Fix two infinite loops in the mount code (bsc#954628).
- PCI: Add VPD function 0 quirk for Intel Ethernet devices (bnc#943786).
- PCI: Add dev_flags bit to access VPD through function 0 (bnc#943786).
- PCI: Clear NumVFs when disabling SR-IOV in sriov_init() (bnc#952084).
- PCI: Refresh First VF Offset and VF Stride when updating NumVFs (bnc#952084).
- PCI: Update NumVFs register when disabling SR-IOV (bnc#952084).
- PCI: delay configuration of SRIOV capability (bnc#952084).
- PCI: set pci sriov page size before reading SRIOV BAR (bnc#952084).
- SCSI: hosts: update to use ida_simple for host_no (bsc#939926)
- SUNRPC refactor rpcauth_checkverf error returns (bsc#955673).
- af_iucv: avoid path quiesce of severed path in shutdown() (bnc#946214).
- ahci: Add Device ID for Intel Sunrise Point PCH (bsc#953799).
- blktap: also call blkif_disconnect() when frontend switched to closed (bsc#952976).
- blktap: refine mm tracking (bsc#952976).
- cachefiles: Avoid deadlocks with fs freezing (bsc#935123).
- dm sysfs: introduce ability to add writable attributes (bsc#904348).
- dm-snap: avoid deadock on s-&gt;lock when a read is split (bsc#939826).
- dm: do not start current request if it would've merged with the previous (bsc#904348).
- dm: impose configurable deadline for dm_request_fn's merge heuristic (bsc#904348).
- drm/i915: Avoid race of intel_crt_detect_hotplug() with HPD interrupt, v2 (bsc#942938).
- drm/i915: Fix DDC probe for passive adapters (bsc#900610, fdo#85924).
- drm/i915: add hotplug activation period to hotplug update mask (bsc#953980).
- fix lpfc_send_rscn_event allocation size claims bnc#935757
- fs: Avoid deadlocks of fsync_bdev() and fs freezing (bsc#935123).
- fs: Fix deadlocks between sync and fs freezing (bsc#935123).
- hugetlb: simplify migrate_huge_page() (bnc#947957).
- hwpoison, hugetlb: lock_page/unlock_page does not match for handling a free hugepage (bnc#947957,).
- ipr: Fix incorrect trace indexing (bsc#940913).
- ipr: Fix invalid array indexing for HRRQ (bsc#940913).
- ipv6: fix tunnel error handling (bsc#952579).
- ipvs: Fix reuse connection if real server is dead (bnc#945827).
- ipvs: drop first packet to dead server (bsc#946078).
- kernel: correct uc_sigmask of the compat signal frame (bnc#946214).
- kernel: fix incorrect use of DIAG44 in continue_trylock_relax() (bnc#946214).
- kexec: Fix race between panic() and crash_kexec() called directly (bnc#937444).
- ktime: add ktime_after and ktime_before helpe (bsc#904348).
- lib/string.c: introduce memchr_inv() (bnc#930788).
- lpfc: Fix cq_id masking problem (bsc#944677).
- macvlan: Support bonding events bsc#948521
- memory-failure: do code refactor of soft_offline_page() (bnc#947957).
- memory-failure: fix an error of mce_bad_pages statistics (bnc#947957).
- memory-failure: use num_poisoned_pages instead of mce_bad_pages (bnc#947957).
- memory-hotplug: update mce_bad_pages when removing the memory (bnc#947957).
- mm/memory-failure.c: fix wrong num_poisoned_pages in handling memory error on thp (bnc#947957).
- mm/memory-failure.c: recheck PageHuge() after hugetlb page migrate successfully (bnc#947957).
- mm/migrate.c: pair unlock_page() and lock_page() when migrating huge pages (bnc#947957).
- mm: exclude reserved pages from dirtyable memory 32b fix (bnc#940017, bnc#949298).
- mm: fix GFP_THISNODE callers and clarify (bsc#954950).
- mm: remove GFP_THISNODE (bsc#954950).
- mm: sl[au]b: add knowledge of PFMEMALLOC reserve pages (Swap over NFS).
- net/core: Add VF link state control policy (bsc#950298).
- netfilter: xt_recent: fix namespace destroy path (bsc#879378).
- panic/x86: Allow cpus to save registers even if they (bnc#940946).
- panic/x86: Fix re-entrance problem due to panic on (bnc#937444).
- pktgen: clean up ktime_t helpers (bsc#904348).
- qla2xxx: Do not reset adapter if SRB handle is in range (bsc#944993).
- qla2xxx: Remove decrement of sp reference count in abort handler (bsc#944993).
- qla2xxx: Remove unavailable firmware files (bsc#921081).
- qla2xxx: do not clear slot in outstanding cmd array (bsc#944993).
- qlge: Fix qlge_update_hw_vlan_features to handle if interface is down (bsc#930835).
- quota: Fix deadlock with suspend and quotas (bsc#935123).
- rcu: Eliminate deadlock between CPU hotplug and expedited grace periods (bsc#949706).
- rtc: cmos: Cancel alarm timer if alarm time is equal to now+1 seconds (bsc#930145).
- rtnetlink: Fix VF IFLA policy (bsc#950298).
- rtnetlink: fix VF info size (bsc#950298).
- s390/dasd: fix disconnected device with valid path mask (bnc#946214).
- s390/dasd: fix invalid PAV assignment after suspend/resume (bnc#946214).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984).
- s390/pci: handle events for unused functions (bnc#946214).
- s390/pci: improve handling of hotplug event 0x301 (bnc#946214).
- s390/pci: improve state check when processing hotplug events (bnc#946214).
- sched/core: Fix task and run queue sched_info::run_delay inconsistencies (bnc#949100).
- sg: fix read() error reporting (bsc#926774).
- usb: xhci: apply XHCI_AVOID_BEI quirk to all Intel xHCI controllers (bnc#944989).
- usbback: correct copy length for partial transfers (bsc#941202).
- usbvision fix overflow of interfaces array (bnc#950998).
- veth: extend device features (bsc#879381).
- vfs: Provide function to get superblock and wait for it to thaw (bsc#935123).
- vmxnet3: adjust ring sizes when interface is down (bsc#950750).
- vmxnet3: fix ethtool ring buffer size setting (bsc#950750).
- writeback: Skip writeback for frozen filesystem (bsc#935123).
- x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- x86/evtchn: make use of PHYSDEVOP_map_pirq.
- x86: mm: drop TLB flush from ptep_set_access_flags (bsc#948330).
- x86: mm: only do a local tlb flush in ptep_set_access_flags() (bsc#948330).
- xen: x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE (bnc#937256).
- xfs: Fix lost direct IO write in the last block (bsc#949744).
- xfs: Fix softlockup in xfs_inode_ag_walk() (bsc#948347).
- xfs: add EOFBLOCKS inode tagging/untagging (bnc#930788).
- xfs: add XFS_IOC_FREE_EOFBLOCKS ioctl (bnc#930788).
- xfs: add background scanning to clear eofblocks inodes (bnc#930788).
- xfs: add inode id filtering to eofblocks scan (bnc#930788).
- xfs: add minimum file size filtering to eofblocks scan (bnc#930788).
- xfs: create function to scan and clear EOFBLOCKS inodes (bnc#930788).
- xfs: create helper to check whether to free eofblocks on inode (bnc#930788).
- xfs: introduce a common helper xfs_icluster_size_fsb (bsc#932805).
- xfs: make xfs_free_eofblocks() non-static, return EAGAIN on trylock failure (bnc#930788).
- xfs: support a tag-based inode_ag_iterator (bnc#930788).
- xfs: support multiple inode id filtering in eofblocks scan (bnc#930788).
- xfs: use xfs_icluster_size_fsb in xfs_bulkstat (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ialloc_inode_init (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_ifree_cluster (bsc#932805).
- xfs: use xfs_icluster_size_fsb in xfs_imap (bsc#932805).
- xhci: Add spurious wakeup quirk for LynxPoint-LP controllers (bnc#949981).
- xhci: Calculate old endpoints correctly on device reset (bnc#944831).
- xhci: For streams the css flag most be read from the stream-ctx on ep stop (bnc#945691).
- xhci: change xhci 1.0 only restrictions to support xhci 1.1 (bnc#949502).
- xhci: fix isoc endpoint dequeue from advancing too far on transaction error (bnc#944837).
- xhci: silence TD warning (bnc#939955).
- xhci: use uninterruptible sleep for waiting for internal operations (bnc#939955).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/814440">SUSE bug 814440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879378">SUSE bug 879378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879381">SUSE bug 879381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900610">SUSE bug 900610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904348">SUSE bug 904348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904965">SUSE bug 904965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921081">SUSE bug 921081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926774">SUSE bug 926774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930145">SUSE bug 930145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930770">SUSE bug 930770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930788">SUSE bug 930788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930835">SUSE bug 930835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932805">SUSE bug 932805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935123">SUSE bug 935123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935757">SUSE bug 935757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937256">SUSE bug 937256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937444">SUSE bug 937444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939826">SUSE bug 939826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939926">SUSE bug 939926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939955">SUSE bug 939955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940017">SUSE bug 940017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940913">SUSE bug 940913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940946">SUSE bug 940946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941202">SUSE bug 941202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942938">SUSE bug 942938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943786">SUSE bug 943786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944296">SUSE bug 944296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944677">SUSE bug 944677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944831">SUSE bug 944831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944837">SUSE bug 944837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944989">SUSE bug 944989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944993">SUSE bug 944993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945691">SUSE bug 945691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945827">SUSE bug 945827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946078">SUSE bug 946078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946214">SUSE bug 946214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946309">SUSE bug 946309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947957">SUSE bug 947957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948330">SUSE bug 948330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948347">SUSE bug 948347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948521">SUSE bug 948521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949100">SUSE bug 949100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949298">SUSE bug 949298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949502">SUSE bug 949502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949706">SUSE bug 949706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949744">SUSE bug 949744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949981">SUSE bug 949981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950298">SUSE bug 950298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950750">SUSE bug 950750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951440">SUSE bug 951440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952084">SUSE bug 952084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952579">SUSE bug 952579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952976">SUSE bug 952976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953799">SUSE bug 953799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953980">SUSE bug 953980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954628">SUSE bug 954628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954950">SUSE bug 954950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954984">SUSE bug 954984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955673">SUSE bug 955673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956709">SUSE bug 956709</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0272/">CVE-2015-0272</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7509/">CVE-2015-7509</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7872/">CVE-2015-7872</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8215/">CVE-2015-8215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567368" comment="kernel-default-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567369" comment="kernel-default-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567370" comment="kernel-default-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567371" comment="kernel-default-extra-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567372" comment="kernel-pae-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567373" comment="kernel-pae-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567374" comment="kernel-pae-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567375" comment="kernel-pae-extra-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567376" comment="kernel-source-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567377" comment="kernel-syms-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567378" comment="kernel-trace-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567379" comment="kernel-xen-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567380" comment="kernel-xen-base-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567381" comment="kernel-xen-devel-3.0.101-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567382" comment="kernel-xen-extra-3.0.101-68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78571" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952188" ref_url="https://bugzilla.suse.com/952188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-2695: Applications which call gss_inquire_context() on a partially-established SPNEGO context could have caused the GSS-API library to read from a pointer using the wrong type, generally causing a process crash (bsc#952188).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-30"/>
	<updated date="2015-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566763" comment="krb5-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566764" comment="krb5-32bit-1.6.3-133.49.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566765" comment="krb5-client-1.6.3-133.49.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78572" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="954270" ref_url="https://bugzilla.suse.com/954270" source="BUGZILLA"/>
		<reference ref_id="954470" ref_url="https://bugzilla.suse.com/954470" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<description>
The krb5 package was updated to fix the following security and non security issues:

- CVE-2015-2695: Fixed missing functions that were still vulnerable (bsc#954270).
- Fixed a memory leak in the handling of error messages (bsc#954470). 
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-17"/>
	<updated date="2015-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954270">SUSE bug 954270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954470">SUSE bug 954470</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566766" comment="krb5-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566767" comment="krb5-32bit-1.6.3-133.49.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566768" comment="krb5-client-1.6.3-133.49.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78573" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="963968" ref_url="https://bugzilla.suse.com/963968" source="BUGZILLA"/>
		<reference ref_id="963975" ref_url="https://bugzilla.suse.com/963975" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<description>

This update for krb5 fixes the following issues:

- CVE-2015-8629: Information leak authenticated attackers with permissions to modify the database (bsc#963968)
- CVE-2015-8631: An authenticated attacker could have caused a memory leak in auditd by supplying a null principal name in request (bsc#963975)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-11"/>
	<updated date="2016-02-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567383" comment="krb5-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567384" comment="krb5-32bit-1.6.3-133.49.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567385" comment="krb5-client-1.6.3-133.49.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78574" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="910457" ref_url="https://bugzilla.suse.com/910457" source="BUGZILLA"/>
		<reference ref_id="910458" ref_url="https://bugzilla.suse.com/910458" source="BUGZILLA"/>
		<reference ref_id="918595" ref_url="https://bugzilla.suse.com/918595" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<description>
krb5 was updated to fix three security issues.

Remote authenticated users could cause denial of service.

These security issues were fixed:
- CVE-2014-5353: NULL pointer dereference when using a ticket policy name as password name (bsc#910457).
- CVE-2014-5354: NULL pointer dereference when using keyless entries (bsc#910458).
- CVE-2014-5355: Denial of service in krb5_read_message (bsc#918595).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-09"/>
	<updated date="2015-07-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566775" comment="krb5-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566776" comment="krb5-32bit-1.6.3-133.49.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566777" comment="krb5-client-1.6.3-133.49.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78575" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html" source="SUSE-SU"/>
		<description>

kvm was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567386" comment="kvm-1.4.2-32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78576" version="1" class="patch">
	<metadata>
		<title>Security update for kvm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="947164" ref_url="https://bugzilla.suse.com/947164" source="BUGZILLA"/>
		<reference ref_id="950590" ref_url="https://bugzilla.suse.com/950590" source="BUGZILLA"/>
		<reference ref_id="953187" ref_url="https://bugzilla.suse.com/953187" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00000.html" source="SUSE-SU"/>
		<description>

This update for kvm fixes the following issues: 

Security issues fixed:
- CVE-2015-7512: The receive packet size is now checked in the emulated
  pcnet driver, eliminating buffer overflow and potential security
  issue by malicious guest systems. (bsc#957162)
- CVE-2015-8345: A infinite loop in processing command block list was fixed that could be
  exploit by malicious guest systems (bsc#956829).

Other bugs fixed:
- To assist users past the migration incompatibility discussed in
  bsc#950590 (restore migration compatibility with SLE11 SP3 and
  SLE12, at the unfortunate expense to prior SLE11 SP4 kvm release
  compatability when a virtio-net device is used), print a message
  which references the support document TID 7017048.
  See https://www.suse.com/support/kb/doc.php?id=7017048
- Fix cases of wrong clock values in kvmclock timekeeping
  (bsc#947164 and bsc#953187)
- Enforce pxe rom sizes to ensure migration compatibility.
  (bsc#950590)
- Fix kvm live migration fails between sles11 sp3 and sp4 (bsc#950590)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-04"/>
	<updated date="2016-01-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/947164">SUSE bug 947164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950590">SUSE bug 950590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953187">SUSE bug 953187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567387" comment="kvm-1.4.2-35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78577" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="920057" ref_url="https://bugzilla.suse.com/920057" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
  (bsc#920057)
* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
  are Practical]
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566821" comment="libgcrypt11-1.5.0-0.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566822" comment="libgcrypt11-32bit-1.5.0-0.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78578" version="1" class="patch">
	<metadata>
		<title>Security update for libksba (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="926826" ref_url="https://bugzilla.suse.com/926826" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2016:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001774.html" source="SUSE-SU"/>
		<description>
The libksba package was updated to fix the following security issues:

- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-23"/>
	<updated date="2015-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566828" comment="libksba-1.0.4-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78579" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="934524" ref_url="https://bugzilla.suse.com/934524" source="BUGZILLA"/>
		<reference ref_id="934525" ref_url="https://bugzilla.suse.com/934525" source="BUGZILLA"/>
		<reference ref_id="934526" ref_url="https://bugzilla.suse.com/934526" source="BUGZILLA"/>
		<reference ref_id="934527" ref_url="https://bugzilla.suse.com/934527" source="BUGZILLA"/>
		<reference ref_id="934528" ref_url="https://bugzilla.suse.com/934528" source="BUGZILLA"/>
		<reference ref_id="934529" ref_url="https://bugzilla.suse.com/934529" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732/" source="CVE"/>
		<reference ref_id="CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467/" source="CVE"/>
		<reference ref_id="CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469/" source="CVE"/>
		<reference ref_id="CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470/" source="CVE"/>
		<reference ref_id="CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471/" source="CVE"/>
		<reference ref_id="CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<description>
libmspack was updated to fix several security vulnerabilities.

- Fix null pointer dereference on a crafted CAB. (bsc#934524, CVE-2014-9732)
- Fix denial of service while processing crafted CHM file. (bsc#934525, CVE-2015-4467)
- Fix denial of service while processing crafted CHM file. (bsc#934529, CVE-2015-4472)
- Fix pointer arithmetic overflow during CHM decompression. (bsc#934526, CVE-2015-4469)
- Fix off-by-one buffer over-read in mspack/mszipd.c. (bsc#934527, CVE-2015-4470)
- Fix off-by-one buffer under-read in mspack/lzxd.c. (bsc#934528, CVE-2015-4471)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566833" comment="libmspack0-0.0.20060920alpha-74.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78580" version="1" class="patch">
	<metadata>
		<title>Security update for libotr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="969785" ref_url="https://bugzilla.suse.com/969785" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001918.html" source="SUSE-SU"/>
		<description>

This update for libotr fixes the following issues:

- Apply 'libotr-CVE-2016-2851.patch' to fix integer overflows that
  used to occur on 64-bit architectures when receiving 4GB messages.
  This flaw could potentially have been exploited by an attacker to
  remotely execute arbitrary code on the user's machine.
  (CVE-2016-2851, bsc#969785)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-09"/>
	<updated date="2016-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567388" comment="libotr2-3.2.0-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78581" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952051" ref_url="https://bugzilla.suse.com/952051" source="BUGZILLA"/>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<description>
The libpng12-0 package was updated to fix the following security issues:

- CVE-2015-8126: Fixed a buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions (bsc#954980).
- CVE-2015-7981: Fixed an out-of-bound read (bsc#952051).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-18"/>
	<updated date="2015-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566851" comment="libpng12-0-1.2.31-5.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566852" comment="libpng12-0-32bit-1.2.31-5.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78582" version="1" class="patch">
	<metadata>
		<title>Security update for libpng12-0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="954980" ref_url="https://bugzilla.suse.com/954980" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<description>
- security update:
   This update fixes the following securit issue:

   * CVE-2015-8126 Multiple buffer overflows in the png_set_PLTE and png_get_PLTE functions
     allow remote attackers to cause a denial of service (application crash) or possibly have 
     unspecified other impact [bsc#954980]
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-08"/>
	<updated date="2016-01-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566853" comment="libpng12-0-1.2.31-5.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566854" comment="libpng12-0-32bit-1.2.31-5.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78583" version="1" class="patch">
	<metadata>
		<title>Recommended update for LibreOffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="306333" ref_url="https://bugzilla.suse.com/306333" source="BUGZILLA"/>
		<reference ref_id="547549" ref_url="https://bugzilla.suse.com/547549" source="BUGZILLA"/>
		<reference ref_id="668145" ref_url="https://bugzilla.suse.com/668145" source="BUGZILLA"/>
		<reference ref_id="679938" ref_url="https://bugzilla.suse.com/679938" source="BUGZILLA"/>
		<reference ref_id="681560" ref_url="https://bugzilla.suse.com/681560" source="BUGZILLA"/>
		<reference ref_id="688200" ref_url="https://bugzilla.suse.com/688200" source="BUGZILLA"/>
		<reference ref_id="718113" ref_url="https://bugzilla.suse.com/718113" source="BUGZILLA"/>
		<reference ref_id="73544" ref_url="https://bugzilla.suse.com/73544" source="BUGZILLA"/>
		<reference ref_id="806250" ref_url="https://bugzilla.suse.com/806250" source="BUGZILLA"/>
		<reference ref_id="857026" ref_url="https://bugzilla.suse.com/857026" source="BUGZILLA"/>
		<reference ref_id="889755" ref_url="https://bugzilla.suse.com/889755" source="BUGZILLA"/>
		<reference ref_id="890735" ref_url="https://bugzilla.suse.com/890735" source="BUGZILLA"/>
		<reference ref_id="907636" ref_url="https://bugzilla.suse.com/907636" source="BUGZILLA"/>
		<reference ref_id="907966" ref_url="https://bugzilla.suse.com/907966" source="BUGZILLA"/>
		<reference ref_id="910805" ref_url="https://bugzilla.suse.com/910805" source="BUGZILLA"/>
		<reference ref_id="910806" ref_url="https://bugzilla.suse.com/910806" source="BUGZILLA"/>
		<reference ref_id="914911" ref_url="https://bugzilla.suse.com/914911" source="BUGZILLA"/>
		<reference ref_id="934423" ref_url="https://bugzilla.suse.com/934423" source="BUGZILLA"/>
		<reference ref_id="936188" ref_url="https://bugzilla.suse.com/936188" source="BUGZILLA"/>
		<reference ref_id="936190" ref_url="https://bugzilla.suse.com/936190" source="BUGZILLA"/>
		<reference ref_id="939996" ref_url="https://bugzilla.suse.com/939996" source="BUGZILLA"/>
		<reference ref_id="940838" ref_url="https://bugzilla.suse.com/940838" source="BUGZILLA"/>
		<reference ref_id="943075" ref_url="https://bugzilla.suse.com/943075" source="BUGZILLA"/>
		<reference ref_id="945047" ref_url="https://bugzilla.suse.com/945047" source="BUGZILLA"/>
		<reference ref_id="945692" ref_url="https://bugzilla.suse.com/945692" source="BUGZILLA"/>
		<reference ref_id="951579" ref_url="https://bugzilla.suse.com/951579" source="BUGZILLA"/>
		<reference ref_id="954345" ref_url="https://bugzilla.suse.com/954345" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<description>

This update brings LibreOffice to version 5.0.4, a major version update.

It brings lots of new features, bug fixes and also security fixes.

Features as seen on http://www.libreoffice.org/discover/new-features/

* LibreOffice 5.0 ships an impressive number of new features for
  its spreadsheet module, Calc: complex formulae image cropping, new
  functions, more powerful conditional formatting, table addressing
  and much more. Calc's blend of performance and features makes it
  an enterprise-ready, heavy duty spreadsheet application capable of
  handling all kinds of workload for an impressive range of use cases
* New icons, major improvements to menus and sidebar : no other
  LibreOffice version has looked that good and helped you be creative and
  get things done the right way. In addition, style management is now more
  intuitive thanks to the visualization of styles right in the interface.
* LibreOffice 5 ships with numerous improvements to document import and
  export filters for MS Office, PDF, RTF, and more. You can now timestamp
  PDF documents generated with LibreOffice and enjoy enhanced document
  conversion fidelity all around.

The Pentaho Flow Reporting Engine is now added and used.

Security issues fixed:

* CVE-2014-8146: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) before 55.1 did not properly
  track directionally isolated pieces of text, which allowed remote
  attackers to cause a denial of service (heap-based buffer overflow)
  or possibly execute arbitrary code via crafted text.
* CVE-2014-8147: The resolveImplicitLevels function in common/ubidi.c
  in the Unicode Bidirectional Algorithm implementation in ICU4C in
  International Components for Unicode (ICU) before 55.1 used an integer
  data type that is inconsistent with a header file, which allowed remote
  attackers to cause a denial of service (incorrect malloc followed by
  invalid free) or possibly execute arbitrary code via crafted text.
* CVE-2015-4551: An arbitrary file disclosure vulnerability in Libreoffice
  and Openoffice Calc and Writer was fixed.
* CVE-2015-5212: A LibreOffice 'PrinterSetup Length' integer underflow
  vulnerability could be used by attackers supplying documents to execute
  code as the user opening the document.
* CVE-2015-5213: A LibreOffice 'Piece Table Counter' invalid check design
  error vulnerability allowed attackers supplying documents to execute
  code as the user opening the document.
* CVE-2015-5214: Multiple Vendor LibreOffice Bookmark Status Memory
  Corruption Vulnerability allowed attackers supplying documents to execute
  code as the user opening the document.
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-25"/>
	<updated date="2016-01-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/306333">SUSE bug 306333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/547549">SUSE bug 547549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/668145">SUSE bug 668145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679938">SUSE bug 679938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681560">SUSE bug 681560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688200">SUSE bug 688200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718113">SUSE bug 718113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/73544">SUSE bug 73544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806250">SUSE bug 806250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857026">SUSE bug 857026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889755">SUSE bug 889755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890735">SUSE bug 890735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907636">SUSE bug 907636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907966">SUSE bug 907966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910805">SUSE bug 910805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910806">SUSE bug 910806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914911">SUSE bug 914911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934423">SUSE bug 934423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936188">SUSE bug 936188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936190">SUSE bug 936190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939996">SUSE bug 939996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940838">SUSE bug 940838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943075">SUSE bug 943075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945047">SUSE bug 945047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945692">SUSE bug 945692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951579">SUSE bug 951579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954345">SUSE bug 954345</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009564685" comment="google-carlito-fonts-1.1.03.beta1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564687" comment="libhyphen0-2.8.8-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564688" comment="libmythes-1_2-0-1.2.4-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564689" comment="libreoffice-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564690" comment="libreoffice-base-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564691" comment="libreoffice-base-drivers-postgresql-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564693" comment="libreoffice-calc-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564694" comment="libreoffice-calc-extensions-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564695" comment="libreoffice-draw-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564696" comment="libreoffice-filters-optional-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564697" comment="libreoffice-gnome-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564698" comment="libreoffice-icon-theme-galaxy-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564699" comment="libreoffice-icon-theme-tango-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564700" comment="libreoffice-impress-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564701" comment="libreoffice-kde4-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564702" comment="libreoffice-l10n-af-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564703" comment="libreoffice-l10n-ar-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564704" comment="libreoffice-l10n-ca-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564705" comment="libreoffice-l10n-cs-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564706" comment="libreoffice-l10n-da-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564707" comment="libreoffice-l10n-de-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564708" comment="libreoffice-l10n-en-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564709" comment="libreoffice-l10n-es-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564710" comment="libreoffice-l10n-fi-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564711" comment="libreoffice-l10n-fr-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564712" comment="libreoffice-l10n-gu-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564713" comment="libreoffice-l10n-hi-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564714" comment="libreoffice-l10n-hu-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564715" comment="libreoffice-l10n-it-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564716" comment="libreoffice-l10n-ja-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564717" comment="libreoffice-l10n-ko-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564718" comment="libreoffice-l10n-nb-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564719" comment="libreoffice-l10n-nl-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564720" comment="libreoffice-l10n-nn-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564721" comment="libreoffice-l10n-pl-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564722" comment="libreoffice-l10n-pt-BR-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564723" comment="libreoffice-l10n-pt-PT-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564724" comment="libreoffice-l10n-ru-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564725" comment="libreoffice-l10n-sk-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564726" comment="libreoffice-l10n-sv-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564727" comment="libreoffice-l10n-xh-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564728" comment="libreoffice-l10n-zh-Hans-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564729" comment="libreoffice-l10n-zh-Hant-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564730" comment="libreoffice-l10n-zu-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564731" comment="libreoffice-mailmerge-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564732" comment="libreoffice-math-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564733" comment="libreoffice-officebean-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564734" comment="libreoffice-pyuno-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564735" comment="libreoffice-sdk-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009515206" comment="libreoffice-share-linker-1-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564736" comment="libreoffice-voikko-4.1-2.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564737" comment="libreoffice-writer-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564738" comment="libreoffice-writer-extensions-5.0.4.2-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564740" comment="libvoikko1-3.7.1-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564741" comment="myspell-af_NA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564742" comment="myspell-af_ZA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564743" comment="myspell-ar-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564744" comment="myspell-ar_AE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564745" comment="myspell-ar_BH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564746" comment="myspell-ar_DZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564747" comment="myspell-ar_EG-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564748" comment="myspell-ar_IQ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564749" comment="myspell-ar_JO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564750" comment="myspell-ar_KW-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564751" comment="myspell-ar_LB-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564752" comment="myspell-ar_LY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564753" comment="myspell-ar_MA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564754" comment="myspell-ar_OM-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564755" comment="myspell-ar_QA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564756" comment="myspell-ar_SA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564757" comment="myspell-ar_SD-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564758" comment="myspell-ar_SY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564759" comment="myspell-ar_TN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564760" comment="myspell-ar_YE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564761" comment="myspell-be_BY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564762" comment="myspell-bg_BG-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564763" comment="myspell-bn_BD-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564764" comment="myspell-bn_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564765" comment="myspell-bs-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564766" comment="myspell-bs_BA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564767" comment="myspell-ca-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564768" comment="myspell-ca_AD-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564769" comment="myspell-ca_ES-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564770" comment="myspell-ca_ES_valencia-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564771" comment="myspell-ca_FR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564772" comment="myspell-ca_IT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564773" comment="myspell-cs_CZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564774" comment="myspell-da_DK-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564775" comment="myspell-de-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564776" comment="myspell-de_AT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564777" comment="myspell-de_CH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564778" comment="myspell-de_DE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564779" comment="myspell-dictionaries-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564780" comment="myspell-el_GR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564781" comment="myspell-en-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564782" comment="myspell-en_AU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564783" comment="myspell-en_BS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564784" comment="myspell-en_BZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564785" comment="myspell-en_CA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564786" comment="myspell-en_GB-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564787" comment="myspell-en_GH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564788" comment="myspell-en_IE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564789" comment="myspell-en_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564790" comment="myspell-en_JM-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564791" comment="myspell-en_MW-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564792" comment="myspell-en_NA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564793" comment="myspell-en_NZ-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564794" comment="myspell-en_PH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564795" comment="myspell-en_TT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564796" comment="myspell-en_US-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564797" comment="myspell-en_ZA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564798" comment="myspell-en_ZW-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564799" comment="myspell-es-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564800" comment="myspell-es_AR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564801" comment="myspell-es_BO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564802" comment="myspell-es_CL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564803" comment="myspell-es_CO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564804" comment="myspell-es_CR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564805" comment="myspell-es_CU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564806" comment="myspell-es_DO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564807" comment="myspell-es_EC-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564808" comment="myspell-es_ES-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564809" comment="myspell-es_GT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564810" comment="myspell-es_HN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564811" comment="myspell-es_MX-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564812" comment="myspell-es_NI-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564813" comment="myspell-es_PA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564814" comment="myspell-es_PE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564815" comment="myspell-es_PR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564816" comment="myspell-es_PY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564817" comment="myspell-es_SV-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564818" comment="myspell-es_UY-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564819" comment="myspell-es_VE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564820" comment="myspell-et_EE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564821" comment="myspell-fr_BE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564822" comment="myspell-fr_CA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564823" comment="myspell-fr_CH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564824" comment="myspell-fr_FR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564825" comment="myspell-fr_LU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564826" comment="myspell-fr_MC-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564827" comment="myspell-gu_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564828" comment="myspell-he_IL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564829" comment="myspell-hi_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564830" comment="myspell-hr_HR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564831" comment="myspell-hu_HU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564832" comment="myspell-it_IT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564833" comment="myspell-lightproof-en-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564834" comment="myspell-lightproof-hu_HU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564835" comment="myspell-lightproof-pt_BR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564836" comment="myspell-lightproof-ru_RU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564837" comment="myspell-lo_LA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564838" comment="myspell-lt_LT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564839" comment="myspell-lv_LV-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564840" comment="myspell-nb_NO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564841" comment="myspell-nl_BE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564842" comment="myspell-nl_NL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564843" comment="myspell-nn_NO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564844" comment="myspell-no-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564845" comment="myspell-pl_PL-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564846" comment="myspell-pt_AO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564847" comment="myspell-pt_BR-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564848" comment="myspell-pt_PT-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564849" comment="myspell-ro-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564850" comment="myspell-ro_RO-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564851" comment="myspell-ru_RU-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564852" comment="myspell-sk_SK-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564853" comment="myspell-sl_SI-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564854" comment="myspell-sr-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564855" comment="myspell-sr_CS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564856" comment="myspell-sr_Latn_CS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564857" comment="myspell-sr_Latn_RS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564858" comment="myspell-sr_RS-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564859" comment="myspell-sv_FI-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564860" comment="myspell-sv_SE-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564861" comment="myspell-te-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564862" comment="myspell-te_IN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564863" comment="myspell-th_TH-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564864" comment="myspell-vi-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564865" comment="myspell-vi_VN-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564866" comment="myspell-zu_ZA-20150827-23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564868" comment="python-importlib-1.0.2-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78584" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="840753" ref_url="https://bugzilla.suse.com/840753" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<description>
librsvg was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-1881: GNOME libsvg allowed remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue (bsc#840753).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-12"/>
	<updated date="2015-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566909" comment="librsvg-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566910" comment="librsvg-32bit-2.26.0-2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566911" comment="rsvg-view-2.26.0-2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78585" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="953516" ref_url="https://bugzilla.suse.com/953516" source="BUGZILLA"/>
		<reference ref_id="953521" ref_url="https://bugzilla.suse.com/953521" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<description>
The libsndfile package was updated to fix the following security issue:

- CVE-2014-9756: Fixed a divide by zero problem that can lead to a Denial of Service (DoS) (bsc#953521).
- CVE-2015-7805: Fixed heap overflow issue (bsc#953516).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-12"/>
	<updated date="2015-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566914" comment="libsndfile-1.0.20-2.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566915" comment="libsndfile-32bit-1.0.20-2.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78586" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="965875" ref_url="https://bugzilla.suse.com/965875" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0739" ref_url="https://www.suse.com/security/cve/CVE-2016-0739/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001905.html" source="SUSE-SU"/>
		<description>

This update for libssh fixes the following issues: 

CVE-2016-0739: Fix Weakness in diffie-hellman secret key generation. (bsc#965875)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/965875">SUSE bug 965875</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0739/">CVE-2016-0739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567389" comment="libssh2-0.2-5.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78587" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="961964" ref_url="https://bugzilla.suse.com/961964" source="BUGZILLA"/>
		<reference ref_id="967026" ref_url="https://bugzilla.suse.com/967026" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001923.html" source="SUSE-SU"/>
		<description>

This update for libssh2_org fixes the following issues: 

- Add SHA256 support for DH group exchange (fate#320343, bsc#961964)

- fix CVE-2016-0787 (bsc#967026)
  * Weakness in diffie-hellman secret key generation lead to much shorter DH groups
    then needed, which could be used to retrieve server keys.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-11"/>
	<updated date="2016-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/961964">SUSE bug 961964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009564877" comment="libssh2-1-1.2.9-4.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78588" version="1" class="patch">
	<metadata>
		<title>Security update for libvdpau (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="943967" ref_url="https://bugzilla.suse.com/943967" source="BUGZILLA"/>
		<reference ref_id="943968" ref_url="https://bugzilla.suse.com/943968" source="BUGZILLA"/>
		<reference ref_id="943969" ref_url="https://bugzilla.suse.com/943969" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<description>

libvdpau was updated to use secure_getenv() instead of getenv() for several variables
so it can be more safely used in setuid applications.

* CVE-2015-5198: libvdpau: incorrect check for security transition (bnc#943967)
* CVE-2015-5199: libvdpau: directory traversal in dlopen (bnc#943968)
* CVE-2015-5200: libvdpau: vulnerability in trace functionality (bnc#943969)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-08"/>
	<updated date="2015-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/943967">SUSE bug 943967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943968">SUSE bug 943968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943969">SUSE bug 943969</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566924" comment="libvdpau1-0.4.1-16.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566925" comment="libvdpau1-32bit-0.4.1-16.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78589" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="948516" ref_url="https://bugzilla.suse.com/948516" source="BUGZILLA"/>
		<reference ref_id="948686" ref_url="https://bugzilla.suse.com/948686" source="BUGZILLA"/>
		<reference ref_id="953110" ref_url="https://bugzilla.suse.com/953110" source="BUGZILLA"/>
		<reference ref_id="959094" ref_url="https://bugzilla.suse.com/959094" source="BUGZILLA"/>
		<reference ref_id="960305" ref_url="https://bugzilla.suse.com/960305" source="BUGZILLA"/>
		<reference ref_id="961173" ref_url="https://bugzilla.suse.com/961173" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001977.html" source="SUSE-SU"/>
		<description>

This update for libvirt fixes the following issues:

Security issue:
- CVE-2015-5313: directory directory traversal privilege
  escalation vulnerability. (bsc#953110)

Bugs fixed:
- bsc#960305: xenxs: support parsing and formatting vif bandwidth
- bsc#961173: xen: use correct domctl version in domaininfolist union
- bsc#959094: xen: Disable building xen-inotify subdriver. It is unmaintained
  and contains bugs that can cause client connection failures.
- bsc#948686: qemu: Use PAUSED state for domains that are starting up
- bsc#948516: Fix profile_status to distringuish between errors and unconfined
  domains.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-01"/>
	<updated date="2016-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/948516">SUSE bug 948516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948686">SUSE bug 948686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959094">SUSE bug 959094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960305">SUSE bug 960305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961173">SUSE bug 961173</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567390" comment="libvirt-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567391" comment="libvirt-client-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567392" comment="libvirt-client-32bit-1.2.5-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567393" comment="libvirt-doc-1.2.5-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78590" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="897031" ref_url="https://bugzilla.suse.com/897031" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051/" source="CVE"/>
		<reference ref_id="CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052/" source="CVE"/>
		<reference ref_id="CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053/" source="CVE"/>
		<reference ref_id="CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054/" source="CVE"/>
		<reference ref_id="CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<description>
The libvncserver package was updated to fix the following security issues:

- bsc#897031: fix several security issues:
  * CVE-2014-6051: Integer overflow in MallocFrameBuffer() on client side.
  * CVE-2014-6052: Lack of malloc() return value checking on client side.
  * CVE-2014-6053: Server crash on a very large ClientCutText message.
  * CVE-2014-6054: Server crash when scaling factor is set to zero.
  * CVE-2014-6055: Multiple stack overflows in File Transfer feature.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-26"/>
	<updated date="2015-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566931" comment="LibVNCServer-0.9.1-156.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78591" version="1" class="patch">
	<metadata>
		<title>Security update for libwmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="831299" ref_url="https://bugzilla.suse.com/831299" source="BUGZILLA"/>
		<reference ref_id="933109" ref_url="https://bugzilla.suse.com/933109" source="BUGZILLA"/>
		<reference ref_id="936058" ref_url="https://bugzilla.suse.com/936058" source="BUGZILLA"/>
		<reference ref_id="936062" ref_url="https://bugzilla.suse.com/936062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001537.html" source="SUSE-SU"/>
		<description>
libwmf was updated to fix four security issues.

These security issues were fixed:
- CVE-2015-4588: Heap-based buffer overflow in the DecodeImage function allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted 'run-length count' in an image in a WMF file (bsc#933109).
- CVE-2015-0848: Heap-based buffer overflow allowed remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image (bsc#933109).
- CVE-2015-4696: Use-after-free vulnerability allowed remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command (bsc#936062).
- CVE-2015-4695: meta.h allowed remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file (bsc#936058).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-10"/>
	<updated date="2015-07-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/831299">SUSE bug 831299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933109">SUSE bug 933109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936058">SUSE bug 936058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936062">SUSE bug 936062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566932" comment="libwmf-0.2.8.4-206.29.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78592" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="928193" ref_url="https://bugzilla.suse.com/928193" source="BUGZILLA"/>
		<reference ref_id="951734" ref_url="https://bugzilla.suse.com/951734" source="BUGZILLA"/>
		<reference ref_id="951735" ref_url="https://bugzilla.suse.com/951735" source="BUGZILLA"/>
		<reference ref_id="956018" ref_url="https://bugzilla.suse.com/956018" source="BUGZILLA"/>
		<reference ref_id="956021" ref_url="https://bugzilla.suse.com/956021" source="BUGZILLA"/>
		<reference ref_id="956260" ref_url="https://bugzilla.suse.com/956260" source="BUGZILLA"/>
		<reference ref_id="957105" ref_url="https://bugzilla.suse.com/957105" source="BUGZILLA"/>
		<reference ref_id="957106" ref_url="https://bugzilla.suse.com/957106" source="BUGZILLA"/>
		<reference ref_id="957107" ref_url="https://bugzilla.suse.com/957107" source="BUGZILLA"/>
		<reference ref_id="957109" ref_url="https://bugzilla.suse.com/957109" source="BUGZILLA"/>
		<reference ref_id="957110" ref_url="https://bugzilla.suse.com/957110" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<description>

    This update fixes the following security issues: 

    * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193]
    * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734]
    * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735]
    * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018]
    * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021]
    * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260]
    * CVE-2015-5312 Fix another entity expansion issue [bnc#957105]
    * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106]
    * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107]
    * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109]
    * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110]

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-05"/>
	<updated date="2016-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566939" comment="libxml2-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566940" comment="libxml2-32bit-2.7.6-0.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566941" comment="libxml2-python-2.7.6-0.34.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78593" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="960674" ref_url="https://bugzilla.suse.com/960674" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<description>

This update for libxml2 fixes the following security issue:

- CVE-2015-8710: Parsing short unclosed HTML comment could cause uninitialized memory access, which allowed remote attackers to read contents from previous HTTP requests depending on the application (bsc#960674)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566942" comment="libxml2-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566943" comment="libxml2-32bit-2.7.6-0.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566944" comment="libxml2-python-2.7.6-0.37.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78594" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="946744" ref_url="https://bugzilla.suse.com/946744" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-1335" ref_url="https://www.suse.com/security/cve/CVE-2015-1335/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001647.html" source="SUSE-SU"/>
		<description>
lxc was update to fix one security issue.

The following vulnerability was fixed:

* CVE-2015-1335: A directory traversal flaw while lxc-start is initially setting up the mounts for a container (bsc#946744)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/946744">SUSE bug 946744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1335/">CVE-2015-1335</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563696" comment="lxc-0.8.0-0.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78595" version="1" class="patch">
	<metadata>
		<title>Security update for mono-core (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="739119" ref_url="https://bugzilla.suse.com/739119" source="BUGZILLA"/>
		<reference ref_id="958097" ref_url="https://bugzilla.suse.com/958097" source="BUGZILLA"/>
		<reference ref_id="CVE-2009-0689" ref_url="https://www.suse.com/security/cve/CVE-2009-0689/" source="CVE"/>
		<reference ref_id="CVE-2012-3543" ref_url="https://www.suse.com/security/cve/CVE-2012-3543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001830.html" source="SUSE-SU"/>
		<description>

mono-core was updated to fix the following vulnerabilities:

- CVE-2009-0689: Remote attackers could cause a denial of service and possibly arbitrary code execution through the string-to-double parser implementation (bsc#958097)
- CVE-2012-3543: Remote attackers could cause a denial of service through increased CPU consumption due to lack of protection against predictable hash collisions when processing form parameters (bsc#739119)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-27"/>
	<updated date="2016-01-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/739119">SUSE bug 739119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958097">SUSE bug 958097</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0689/">CVE-2009-0689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3543/">CVE-2012-3543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567394" comment="bytefx-data-mysql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567395" comment="ibm-data-db2-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567396" comment="mono-core-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567397" comment="mono-data-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567398" comment="mono-data-firebird-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567399" comment="mono-data-oracle-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567400" comment="mono-data-postgresql-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567401" comment="mono-data-sqlite-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567402" comment="mono-data-sybase-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567403" comment="mono-devel-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567404" comment="mono-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567405" comment="mono-jscript-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567406" comment="mono-locale-extras-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567407" comment="mono-nunit-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567408" comment="mono-wcf-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567409" comment="mono-web-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567410" comment="mono-winforms-2.6.7-0.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567411" comment="monodoc-core-2.6.7-0.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78596" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="954447" ref_url="https://bugzilla.suse.com/954447" source="BUGZILLA"/>
		<reference ref_id="963520" ref_url="https://bugzilla.suse.com/963520" source="BUGZILLA"/>
		<reference ref_id="963632" ref_url="https://bugzilla.suse.com/963632" source="BUGZILLA"/>
		<reference ref_id="963635" ref_url="https://bugzilla.suse.com/963635" source="BUGZILLA"/>
		<reference ref_id="963731" ref_url="https://bugzilla.suse.com/963731" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<description>

This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: (bsc#963520)

Mozilla Firefox was updated to 38.6.0 ESR.
Mozilla NSS was updated to 3.20.2.

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-04"/>
	<updated date="2016-02-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/954447">SUSE bug 954447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566945" comment="MozillaFirefox-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566946" comment="MozillaFirefox-branding-SLED-38-18.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566947" comment="MozillaFirefox-translations-38.6.0esr-31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566948" comment="libfreebl3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566949" comment="libfreebl3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566950" comment="libsoftokn3-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566951" comment="libsoftokn3-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566952" comment="mozilla-nss-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566953" comment="mozilla-nss-32bit-3.20.2-25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566954" comment="mozilla-nss-tools-3.20.2-25.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78597" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="935979" ref_url="https://bugzilla.suse.com/935979" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2015:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001554.html" source="SUSE-SU"/>
		<description>
mozilla-nspr was update to version 4.10.8		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-14"/>
	<updated date="2015-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566955" comment="mozilla-nspr-4.10.8-0.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566956" comment="mozilla-nspr-32bit-4.10.8-0.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78598" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="959888" ref_url="https://bugzilla.suse.com/959888" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<description>
This update contains mozilla-nss 3.19.2.2 and fixes the following security issue:

   - CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)
  		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-21"/>
	<updated date="2016-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566957" comment="libfreebl3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566958" comment="libfreebl3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566959" comment="libsoftokn3-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566960" comment="libsoftokn3-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566961" comment="mozilla-nss-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566962" comment="mozilla-nss-32bit-3.19.2.2-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566963" comment="mozilla-nss-tools-3.19.2.2-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78599" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="924663" ref_url="https://bugzilla.suse.com/924663" source="BUGZILLA"/>
		<reference ref_id="928962" ref_url="https://bugzilla.suse.com/928962" source="BUGZILLA"/>
		<reference ref_id="934401" ref_url="https://bugzilla.suse.com/934401" source="BUGZILLA"/>
		<reference ref_id="938412" ref_url="https://bugzilla.suse.com/938412" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-2582" ref_url="https://www.suse.com/security/cve/CVE-2015-2582/" source="CVE"/>
		<reference ref_id="CVE-2015-2611" ref_url="https://www.suse.com/security/cve/CVE-2015-2611/" source="CVE"/>
		<reference ref_id="CVE-2015-2617" ref_url="https://www.suse.com/security/cve/CVE-2015-2617/" source="CVE"/>
		<reference ref_id="CVE-2015-2620" ref_url="https://www.suse.com/security/cve/CVE-2015-2620/" source="CVE"/>
		<reference ref_id="CVE-2015-2639" ref_url="https://www.suse.com/security/cve/CVE-2015-2639/" source="CVE"/>
		<reference ref_id="CVE-2015-2641" ref_url="https://www.suse.com/security/cve/CVE-2015-2641/" source="CVE"/>
		<reference ref_id="CVE-2015-2643" ref_url="https://www.suse.com/security/cve/CVE-2015-2643/" source="CVE"/>
		<reference ref_id="CVE-2015-2648" ref_url="https://www.suse.com/security/cve/CVE-2015-2648/" source="CVE"/>
		<reference ref_id="CVE-2015-2661" ref_url="https://www.suse.com/security/cve/CVE-2015-2661/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-4737" ref_url="https://www.suse.com/security/cve/CVE-2015-4737/" source="CVE"/>
		<reference ref_id="CVE-2015-4752" ref_url="https://www.suse.com/security/cve/CVE-2015-4752/" source="CVE"/>
		<reference ref_id="CVE-2015-4756" ref_url="https://www.suse.com/security/cve/CVE-2015-4756/" source="CVE"/>
		<reference ref_id="CVE-2015-4757" ref_url="https://www.suse.com/security/cve/CVE-2015-4757/" source="CVE"/>
		<reference ref_id="CVE-2015-4761" ref_url="https://www.suse.com/security/cve/CVE-2015-4761/" source="CVE"/>
		<reference ref_id="CVE-2015-4767" ref_url="https://www.suse.com/security/cve/CVE-2015-4767/" source="CVE"/>
		<reference ref_id="CVE-2015-4769" ref_url="https://www.suse.com/security/cve/CVE-2015-4769/" source="CVE"/>
		<reference ref_id="CVE-2015-4771" ref_url="https://www.suse.com/security/cve/CVE-2015-4771/" source="CVE"/>
		<reference ref_id="CVE-2015-4772" ref_url="https://www.suse.com/security/cve/CVE-2015-4772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<description>

MySQL was updated to version 5.5.45, fixing bugs and security issues.

A list of all changes can be found on:

- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-45.html
- http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html

To fix the 'BACKRONYM' security issue (CVE-2015-3152) the behaviour of 
the SSL options was changed slightly to meet expectations:
Now using '--ssl-verify-server-cert' and '--ssl[-*]' implies that the ssl
connection is required. The mysql client will now print an error
if ssl is required, but the server can not handle a ssl
connection [bnc#924663], [bnc#928962], [CVE-2015-3152]

Additional bugs fixed:
- fix rc.mysql-multi script to start instances after restart
  properly [bnc#934401].
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-22"/>
	<updated date="2015-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934401">SUSE bug 934401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938412">SUSE bug 938412</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2582/">CVE-2015-2582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2611/">CVE-2015-2611</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2617/">CVE-2015-2617</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2620/">CVE-2015-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2639/">CVE-2015-2639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2641/">CVE-2015-2641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2643/">CVE-2015-2643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2648/">CVE-2015-2648</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2661/">CVE-2015-2661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4737/">CVE-2015-4737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4752/">CVE-2015-4752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4756/">CVE-2015-4756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4757/">CVE-2015-4757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4761/">CVE-2015-4761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4767/">CVE-2015-4767</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4769/">CVE-2015-4769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4771/">CVE-2015-4771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4772/">CVE-2015-4772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566972" comment="libmysql55client18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566973" comment="libmysql55client18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566974" comment="libmysql55client_r18-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566975" comment="libmysql55client_r18-32bit-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566976" comment="mysql-5.5.45-0.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566977" comment="mysql-client-5.5.45-0.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78600" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="951391" ref_url="https://bugzilla.suse.com/951391" source="BUGZILLA"/>
		<reference ref_id="952196" ref_url="https://bugzilla.suse.com/952196" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-4730" ref_url="https://www.suse.com/security/cve/CVE-2015-4730/" source="CVE"/>
		<reference ref_id="CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766/" source="CVE"/>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904/" source="CVE"/>
		<reference ref_id="CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905/" source="CVE"/>
		<reference ref_id="CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<description>
The mysql package was updated to version 5.5.46 to fixs several security and non security issues.

- bnc#951391: update to version 5.5.46
  * changes:
    http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-46.html
  * fixed CVEs:
    CVE-2015-1793, CVE-2015-0286, CVE-2015-0288, CVE-2015-1789,
    CVE-2015-4730, CVE-2015-4766, CVE-2015-4792, CVE-2015-4800,
    CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819,
    CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836,
    CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864,
    CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890,
    CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910,
    CVE-2015-4913
- bnc#952196: Fixed a build error for ppc*, s390* and ia64 architectures.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-18"/>
	<updated date="2015-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952196">SUSE bug 952196</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4730/">CVE-2015-4730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566978" comment="libmysql55client18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566979" comment="libmysql55client18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566980" comment="libmysql55client_r18-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566981" comment="libmysql55client_r18-32bit-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566982" comment="mysql-5.5.46-0.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566983" comment="mysql-client-5.5.46-0.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78601" version="1" class="patch">
	<metadata>
		<title>Security update for mysql (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="959724" ref_url="https://bugzilla.suse.com/959724" source="BUGZILLA"/>
		<reference ref_id="960961" ref_url="https://bugzilla.suse.com/960961" source="BUGZILLA"/>
		<reference ref_id="962779" ref_url="https://bugzilla.suse.com/962779" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<description>

This update to MySQL 5.5.47 fixes the following issues (bsc#962779):

- CVE-2015-7744: Lack of verification against faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
- CVE-2016-0502: Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Options. 
- CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. 
- CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 
- CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML. 
- CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB. 
- CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect integrity via unknown vectors related to encryption. 
- CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via vectors related to UDF. 
- CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to privileges. 
- CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
- bsc#959724: Possible buffer overflow from incorrect use of strcpy() and sprintf()
    
The following bugs were fixed:
    
- bsc#960961: Incorrect use of plugin-load option in default_plugins.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/959724">SUSE bug 959724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960961">SUSE bug 960961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566984" comment="libmysql55client18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566985" comment="libmysql55client18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566986" comment="libmysql55client_r18-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566987" comment="libmysql55client_r18-32bit-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566988" comment="mysql-5.5.47-0.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566989" comment="mysql-client-5.5.47-0.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78602" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="853382" ref_url="https://bugzilla.suse.com/853382" source="BUGZILLA"/>
		<reference ref_id="935863" ref_url="https://bugzilla.suse.com/935863" source="BUGZILLA"/>
		<reference ref_id="940188" ref_url="https://bugzilla.suse.com/940188" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<description>
net-snmp was updated to fix one security vulnerability and several bugs.

- fix a vulnerability within the snmp_pdu_parse() function of snmp_api.c. (bnc#940188, CVE-2015-5621) 
- Add build requirement 'procps' to fix a net-snmp-config error. (bsc#935863)
- add support for /dev/shm in snmp hostmib (bnc#853382, FATE#316893).
- stop snmptrapd on package removal.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-17"/>
	<updated date="2015-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/853382">SUSE bug 853382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935863">SUSE bug 935863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009566990" comment="libsnmp15-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563731" comment="libsnmp15-32bit-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566991" comment="net-snmp-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566992" comment="perl-SNMP-5.4.2.1-8.12.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009566993" comment="snmp-mibs-5.4.2.1-8.12.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78603" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="905885" ref_url="https://bugzilla.suse.com/905885" source="BUGZILLA"/>
		<reference ref_id="910063" ref_url="https://bugzilla.suse.com/910063" source="BUGZILLA"/>
		<reference ref_id="936327" ref_url="https://bugzilla.suse.com/936327" source="BUGZILLA"/>
		<reference ref_id="942441" ref_url="https://bugzilla.suse.com/942441" source="BUGZILLA"/>
		<reference ref_id="942587" ref_url="https://bugzilla.suse.com/942587" source="BUGZILLA"/>
		<reference ref_id="944300" ref_url="https://bugzilla.suse.com/944300" source="BUGZILLA"/>
		<reference ref_id="951608" ref_url="https://bugzilla.suse.com/951608" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<description>
This ntp update provides the following security and non security fixes:

- Update to 4.2.8p4 to fix several security issues (bsc#951608):
  * CVE-2015-7871: NAK to the Future: Symmetric association
    authentication bypass via crypto-NAK
  * CVE-2015-7855: decodenetnum() will ASSERT botch instead of
    returning FAIL on some bogus values
  * CVE-2015-7854: Password Length Memory Corruption Vulnerability
  * CVE-2015-7853: Invalid length data provided by a custom
    refclock driver could cause a buffer overflow
  * CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability
  * CVE-2015-7851 saveconfig Directory Traversal Vulnerability
  * CVE-2015-7850 remote config logfile-keyfile
  * CVE-2015-7849 trusted key use-after-free
  * CVE-2015-7848 mode 7 loop counter underrun
  * CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC
  * CVE-2015-7703 configuration directives 'pidfile' and
    'driftfile' should only be allowed locally
  * CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should
    validate the origin timestamp field
  * CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey
    data packet length checks
- Use ntpq instead of deprecated ntpdc in start-ntpd (bnc#936327).
- Add a controlkey to ntp.conf to make the above work.
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Don't let 'keysdir' lines in ntp.conf trigger the 'keys' parser.
- Fix the comment regarding addserver in ntp.conf (bnc#910063).
- Remove ntp.1.gz, it wasn't installed anymore.
- Remove ntp-4.2.7-rh-manpages.tar.gz and only keep ntptime.8.gz.
  The rest is partially irrelevant, partially redundant and
  potentially outdated (bsc#942587).
- Remove 'kod' from the restrict line in ntp.conf (bsc#944300).
- Use SHA1 instead of MD5 for symmetric keys (bsc#905885).
- Require perl-Socket6 (bsc#942441).
- Fix incomplete backporting of 'rcntp ntptimemset'.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/905885">SUSE bug 905885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910063">SUSE bug 910063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942441">SUSE bug 942441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942587">SUSE bug 942587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944300">SUSE bug 944300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567412" comment="ntp-4.2.8p4-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567413" comment="ntp-doc-4.2.8p4-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78604" version="1" class="patch">
	<metadata>
		<title>Recommended update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="924496" ref_url="https://bugzilla.suse.com/924496" source="BUGZILLA"/>
		<reference ref_id="932773" ref_url="https://bugzilla.suse.com/932773" source="BUGZILLA"/>
		<reference ref_id="937766" ref_url="https://bugzilla.suse.com/937766" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<description>
openldap2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-4000: The Logjam Attack / weakdh.org (bsc#937766).

This non-security issue was fixed:
- bsc#932773: ldapmodify failed with DOS format LDIF files containing '-' separator.
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/924496">SUSE bug 924496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932773">SUSE bug 932773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567004" comment="libldap-2_4-2-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567005" comment="libldap-2_4-2-32bit-2.4.26-0.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567006" comment="openldap2-client-2.4.26-0.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78605" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="945582" ref_url="https://bugzilla.suse.com/945582" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<description>


This update fixes the following security issue:

- CVE-2015-6908. Passing a crafted packet to the function  ber_get_next(),
    an attacker may cause a remote denial of service, crashing the OpenLDAP server (bsc#945582).

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-12"/>
	<updated date="2016-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567010" comment="libldap-2_4-2-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567011" comment="libldap-2_4-2-32bit-2.4.26-0.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567012" comment="openldap2-client-2.4.26-0.62.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78606" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="903649" ref_url="https://bugzilla.suse.com/903649" source="BUGZILLA"/>
		<reference ref_id="932483" ref_url="https://bugzilla.suse.com/932483" source="BUGZILLA"/>
		<reference ref_id="936695" ref_url="https://bugzilla.suse.com/936695" source="BUGZILLA"/>
		<reference ref_id="938746" ref_url="https://bugzilla.suse.com/938746" source="BUGZILLA"/>
		<reference ref_id="939932" ref_url="https://bugzilla.suse.com/939932" source="BUGZILLA"/>
		<reference ref_id="943006" ref_url="https://bugzilla.suse.com/943006" source="BUGZILLA"/>
		<reference ref_id="943010" ref_url="https://bugzilla.suse.com/943010" source="BUGZILLA"/>
		<reference ref_id="945484" ref_url="https://bugzilla.suse.com/945484" source="BUGZILLA"/>
		<reference ref_id="945493" ref_url="https://bugzilla.suse.com/945493" source="BUGZILLA"/>
		<reference ref_id="947458" ref_url="https://bugzilla.suse.com/947458" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352/" source="CVE"/>
		<reference ref_id="CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600/" source="CVE"/>
		<reference ref_id="CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563/" source="CVE"/>
		<reference ref_id="CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<description>
OpenSSH was updated to fix several security issues and bugs.

Please note that due to a bug in the previous shipped openssh version, sshd might
not correctly restart. Please verify that the ssh daemon is running after installing
this update.

These security issues were fixed:

* CVE-2015-5352: The x11_open_helper function, when ForwardX11Trusted mode
  is not used, lacked a check of the refusal deadline for X connections,
  which made it easier for remote attackers to bypass intended access
  restrictions via a connection outside of the permitted time window.
  (bsc#936695)

* CVE-2015-5600: The kbdint_next_device function in auth2-chall.c
  in sshd did not properly restrict the processing of keyboard-interactive
  devices within a single connection, which made it easier for remote
  attackers to conduct brute-force attacks or cause a denial of service
  (CPU consumption) via a long and duplicative list in the ssh
  -oKbdInteractiveDevices option, as demonstrated by a modified client
  that provides a different password for each pam element on this list.
  (bsc#938746)

* CVE-2015-4000: Removed and disabled weak DH groups to address LOGJAM.
  (bsc#932483)

* Hardening patch to fix sftp RCE. (bsc#903649)

* CVE-2015-6563: The monitor component in sshd accepted extraneous username
  data in MONITOR_REQ_PAM_INIT_CTX requests, which allowed local users to
  conduct impersonation attacks by leveraging any SSH login access in
  conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM
  request, related to monitor.c and monitor_wrap.c.

* CVE-2015-6564: Use-after-free vulnerability in the mm_answer_pam_free_ctx
  function in monitor.c in sshd might have allowed local users to gain
  privileges by leveraging control of the sshd uid to send an unexpectedly
  early MONITOR_REQ_PAM_FREE_CTX request.

Additional a bug was fixed that could lead to openssh not working in 
chroot (bsc#947458).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-05"/>
	<updated date="2015-10-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/903649">SUSE bug 903649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939932">SUSE bug 939932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945484">SUSE bug 945484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945493">SUSE bug 945493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947458">SUSE bug 947458</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567414" comment="openssh-6.6p1-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567415" comment="openssh-askpass-gnome-6.6p1-13.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567416" comment="openssh-helpers-6.6p1-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78607" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="961642" ref_url="https://bugzilla.suse.com/961642" source="BUGZILLA"/>
		<reference ref_id="961645" ref_url="https://bugzilla.suse.com/961645" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" source="SUSE-SU"/>
		<description>

This update for openssh fixes the following issues:

- CVE-2016-0777: A malicious or compromised server could cause the OpenSSH client to expose part or all of the client's private key through the roaming feature (bsc#961642)
- CVE-2016-0778: A malicious or compromised server could could trigger a buffer overflow in the OpenSSH client through the roaming feature (bsc#961645)

This update disables the undocumented feature supported by the OpenSSH client and a commercial SSH server.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-14"/>
	<updated date="2016-01-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567417" comment="openssh-6.6p1-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567418" comment="openssh-askpass-gnome-6.6p1-16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567419" comment="openssh-helpers-6.6p1-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78608" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952099" ref_url="https://bugzilla.suse.com/952099" source="BUGZILLA"/>
		<reference ref_id="957812" ref_url="https://bugzilla.suse.com/957812" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes the following issues: 

- CVE-2015-3195: When presented with a malformed X509_ATTRIBUTE structure
  OpenSSL would leak memory. This structure is used by the PKCS#7 and CMS
  routines so any application which reads PKCS#7 or CMS data from untrusted
  sources is affected. SSL/TLS is not affected. (bsc#957812)

- Prevent segfault in s_client with invalid options (bsc#952099)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-15"/>
	<updated date="2015-12-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952099">SUSE bug 952099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567024" comment="libopenssl0_9_8-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567025" comment="libopenssl0_9_8-32bit-0.9.8j-0.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567026" comment="openssl-0.9.8j-0.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78609" version="1" class="patch">
	<metadata>
		<title>Security update for openssl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952871" ref_url="https://bugzilla.suse.com/952871" source="BUGZILLA"/>
		<reference ref_id="963415" ref_url="https://bugzilla.suse.com/963415" source="BUGZILLA"/>
		<reference ref_id="967787" ref_url="https://bugzilla.suse.com/967787" source="BUGZILLA"/>
		<reference ref_id="968046" ref_url="https://bugzilla.suse.com/968046" source="BUGZILLA"/>
		<reference ref_id="968047" ref_url="https://bugzilla.suse.com/968047" source="BUGZILLA"/>
		<reference ref_id="968048" ref_url="https://bugzilla.suse.com/968048" source="BUGZILLA"/>
		<reference ref_id="968051" ref_url="https://bugzilla.suse.com/968051" source="BUGZILLA"/>
		<reference ref_id="968053" ref_url="https://bugzilla.suse.com/968053" source="BUGZILLA"/>
		<reference ref_id="968374" ref_url="https://bugzilla.suse.com/968374" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0703" ref_url="https://www.suse.com/security/cve/CVE-2016-0703/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<description>

This update for openssl fixes various security issues and bugs: 

Security issues fixed:
- CVE-2016-0800 aka the 'DROWN' attack (bsc#968046):
  OpenSSL was vulnerable to a cross-protocol attack that could lead to
  decryption of TLS sessions by using a server supporting SSLv2 and
  EXPORT cipher suites as a Bleichenbacher RSA padding oracle.

  This update changes the openssl library to:

  * Disable SSLv2 protocol support by default.

    This can be overridden by setting the environment variable
    'OPENSSL_ALLOW_SSL2' or by using SSL_CTX_clear_options using the
    SSL_OP_NO_SSLv2 flag.

    Note that various services and clients had already disabled SSL
    protocol 2 by default previously.

  * Disable all weak EXPORT ciphers by default. These can be reenabled
    if required by old legacy software using the environment variable
    'OPENSSL_ALLOW_EXPORT'.

- CVE-2016-0705 (bnc#968047):
  A double free() bug in the DSA ASN1 parser code was fixed that could
  be abused to facilitate a denial-of-service attack.

- CVE-2016-0797 (bnc#968048):
  The BN_hex2bn() and BN_dec2bn() functions had a bug that could result
  in an attempt to de-reference a NULL pointer leading to crashes.
  This could have security consequences if these functions were ever
  called by user applications with large untrusted hex/decimal data. Also,
  internal usage of these functions in OpenSSL uses data from config files
  or application command line arguments. If user developed applications
  generated config file data based on untrusted data, then this could
  have had security consequences as well.

- CVE-2016-0799 (bnc#968374)
  On many 64 bit systems, the internal fmtstr() and doapr_outch()
  functions could miscalculate the length of a string and attempt to
  access out-of-bounds memory locations. These problems could have
  enabled attacks where large amounts of untrusted data is passed to
  the BIO_*printf functions. If applications use these functions in
  this way then they could have been vulnerable. OpenSSL itself uses
  these functions when printing out human-readable dumps of ASN.1
  data. Therefore applications that print this data could have been
  vulnerable if the data is from untrusted sources. OpenSSL command line
  applications could also have been vulnerable when they print out ASN.1
  data, or if untrusted data is passed as command line arguments. Libssl
  is not considered directly vulnerable.

- CVE-2015-3197 (bsc#963415):
  The SSLv2 protocol did not block disabled ciphers.

Note that the March 1st 2016 release also references following CVEs
that were fixed by us with CVE-2015-0293 in 2015:

- CVE-2016-0703 (bsc#968051): This issue only affected versions of
  OpenSSL prior to March 19th 2015 at which time the code was refactored
  to address vulnerability CVE-2015-0293. It would have made the above
  'DROWN' attack much easier.
- CVE-2016-0704 (bsc#968053): 'Bleichenbacher oracle in SSLv2'
  This issue only affected versions of OpenSSL prior to March 19th
  2015 at which time the code was refactored to address vulnerability
  CVE-2015-0293. It would have made the above 'DROWN' attack much easier.

Also fixes the following bug:
- Avoid running OPENSSL_config twice. This avoids breaking
  engine loading and also fixes a memory leak in libssl. (bsc#952871 bsc#967787)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-01"/>
	<updated date="2016-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/952871">SUSE bug 952871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967787">SUSE bug 967787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0703/">CVE-2016-0703</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567420" comment="libopenssl0_9_8-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567421" comment="libopenssl0_9_8-32bit-0.9.8j-0.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567422" comment="openssl-0.9.8j-0.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78610" version="1" class="patch">
	<metadata>
		<title>Security update for orca (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="916835" ref_url="https://bugzilla.suse.com/916835" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4245" ref_url="https://www.suse.com/security/cve/CVE-2013-4245/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001710.html" source="SUSE-SU"/>
		<description>
This orca update fixes the following security issue.

- Don't try to import modules from current working directory (bsc#916835, CVE-2013-4245).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-02"/>
	<updated date="2015-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/916835">SUSE bug 916835</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4245/">CVE-2013-4245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567029" comment="orca-2.28.3-0.5.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567030" comment="orca-lang-2.28.3-0.5.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78611" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<description>

This update of postgresql94 to 9.4.5 fixes the following issues:

* CVE-2015-5289: json or jsonb input values constructed from arbitrary user input could have crashed the PostgreSQL server and caused a denial of service (bsc#949670)
* CVE-2015-5288: crypt() (pgCrypto extension) couldi potentially be exploited to read a few additional bytes of memory (bsc#949669)

Also contains all changes and bugfixes in the upstream 9.4.5 release:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-16"/>
	<updated date="2016-02-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567044" comment="libecpg6-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567045" comment="libpq5-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567046" comment="libpq5-32bit-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567047" comment="postgresql94-9.4.5-0.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567048" comment="postgresql94-docs-9.4.5-0.8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78612" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql94 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="949669" ref_url="https://bugzilla.suse.com/949669" source="BUGZILLA"/>
		<reference ref_id="949670" ref_url="https://bugzilla.suse.com/949670" source="BUGZILLA"/>
		<reference ref_id="966435" ref_url="https://bugzilla.suse.com/966435" source="BUGZILLA"/>
		<reference ref_id="966436" ref_url="https://bugzilla.suse.com/966436" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772/" source="CVE"/>
		<reference ref_id="CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288/" source="CVE"/>
		<reference ref_id="CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766/" source="CVE"/>
		<reference ref_id="CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<description>

This update for postgresql94 fixes the following issues: 

- Security and bugfix release 9.4.6:
  * *** IMPORTANT ***
    Users of version 9.4 will need to reindex any jsonb_path_ops
    indexes they have created, in order to fix a persistent issue
    with missing index entries.
  * Fix infinite loops and buffer-overrun problems in regular
    expressions (CVE-2016-0773, bsc#966436).
  * Fix regular-expression compiler to handle loops of constraint
    arcs (CVE-2007-4772).
  * Prevent certain PL/Java parameters from being set by
    non-superusers (CVE-2016-0766, bsc#966435).
  * Fix many issues in pg_dump with specific object types
  * Prevent over-eager pushdown of HAVING clauses for
    GROUPING SETS
  * Fix deparsing error with ON CONFLICT ... WHERE clauses
  * Fix tableoid errors for postgres_fdw
  * Prevent floating-point exceptions in pgbench
  * Make \det search Foreign Table names consistently
  * Fix quoting of domain constraint names in pg_dump
  * Prevent putting expanded objects into Const nodes
  * Allow compile of PL/Java on Windows
  * Fix 'unresolved symbol' errors in PL/Python execution
  * Allow Python2 and Python3 to be used in the same database
  * Add support for Python 3.5 in PL/Python
  * Fix issue with subdirectory creation during initdb
  * Make pg_ctl report status correctly on Windows
  * Suppress confusing error when using pg_receivexlog with older
    servers
  * Multiple documentation corrections and additions
  * Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
  http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- Security and bugfix release 9.4.5:
  * CVE-2015-5289, bsc#949670: json or jsonb input values
    constructed from arbitrary user input can crash the PostgreSQL
    server and cause a denial of service.
  * CVE-2015-5288, bsc#949669: The crypt() function included with
    the optional pgCrypto extension could be exploited to read a
    few additional bytes of memory. No working exploit for this
    issue has been developed.
- For the full release notse, see:
  http://www.postgresql.org/docs/current/static/release-9-4-5.html
- Relax dependency on libpq to major version.
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-07"/>
	<updated date="2016-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567423" comment="libecpg6-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567424" comment="libpq5-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567425" comment="libpq5-32bit-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567426" comment="postgresql94-9.4.6-0.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567427" comment="postgresql94-docs-9.4.6-0.14.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78613" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="930189" ref_url="https://bugzilla.suse.com/930189" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7440" ref_url="https://www.suse.com/security/cve/CVE-2013-7440/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001606.html" source="SUSE-SU"/>
		<description>
python-setuptools was updated to fix one security issue.

The following vulnerability was fixed:

* CVE-2013-7440: Non-RFC6125-compliant host name matching was incorrect (bsc#930189)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-29"/>
	<updated date="2015-07-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930189">SUSE bug 930189</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7440/">CVE-2013-7440</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567099" comment="python-setuptools-0.6c11-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78614" version="1" class="patch">
	<metadata>
		<title>Security update for rpcbind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="940191" ref_url="https://bugzilla.suse.com/940191" source="BUGZILLA"/>
		<reference ref_id="946204" ref_url="https://bugzilla.suse.com/946204" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001620.html" source="SUSE-SU"/>
		<description>

A use-after-free security bug in rpcbind was fixed which could lead to a remote denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-18"/>
	<updated date="2015-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567100" comment="rpcbind-0.1.6+git20080930-6.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78615" version="1" class="patch">
	<metadata>
		<title>Security update for rsync (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="900914" ref_url="https://bugzilla.suse.com/900914" source="BUGZILLA"/>
		<reference ref_id="915410" ref_url="https://bugzilla.suse.com/915410" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<description>

This update for rsync fixes two security issues:

- CVE-2014-8242: Checksum collisions leading to a denial of service (bsc#900914)
- CVE-2014-9512: Malicious servers could send files outside of the transferred directory (bsc#915410)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-20"/>
	<updated date="2016-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567101" comment="rsync-3.0.4-2.49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78616" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="967017" ref_url="https://bugzilla.suse.com/967017" source="BUGZILLA"/>
		<reference ref_id="968222" ref_url="https://bugzilla.suse.com/968222" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" source="SUSE-SU"/>
		<description>

This update for samba fixes the following issues:

Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change permissions on link 
  target; (bso#11648); (bsc#968222).

Bug fixed:
- Fix leaking memory in libsmbclient: Add missing talloc
  stackframe; (bso#11177); (bsc#967017).
		</description>
<advisory from="security@suse.de">
	<issued date="2016-03-21"/>
	<updated date="2016-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/967017">SUSE bug 967017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567428" comment="libldb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567429" comment="libldb1-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567430" comment="libsmbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567431" comment="libsmbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567432" comment="libtalloc2-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567433" comment="libtalloc2-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567434" comment="libtdb1-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567435" comment="libtdb1-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567436" comment="libtevent0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567437" comment="libtevent0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567438" comment="libwbclient0-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567439" comment="libwbclient0-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567440" comment="samba-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567441" comment="samba-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567442" comment="samba-client-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567443" comment="samba-client-32bit-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567444" comment="samba-doc-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567445" comment="samba-krb-printing-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567446" comment="samba-winbind-3.6.3-67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567447" comment="samba-winbind-32bit-3.6.3-67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78617" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="295284" ref_url="https://bugzilla.suse.com/295284" source="BUGZILLA"/>
		<reference ref_id="912457" ref_url="https://bugzilla.suse.com/912457" source="BUGZILLA"/>
		<reference ref_id="934299" ref_url="https://bugzilla.suse.com/934299" source="BUGZILLA"/>
		<reference ref_id="936909" ref_url="https://bugzilla.suse.com/936909" source="BUGZILLA"/>
		<reference ref_id="948244" ref_url="https://bugzilla.suse.com/948244" source="BUGZILLA"/>
		<reference ref_id="949022" ref_url="https://bugzilla.suse.com/949022" source="BUGZILLA"/>
		<reference ref_id="953382" ref_url="https://bugzilla.suse.com/953382" source="BUGZILLA"/>
		<reference ref_id="958582" ref_url="https://bugzilla.suse.com/958582" source="BUGZILLA"/>
		<reference ref_id="958583" ref_url="https://bugzilla.suse.com/958583" source="BUGZILLA"/>
		<reference ref_id="958584" ref_url="https://bugzilla.suse.com/958584" source="BUGZILLA"/>
		<reference ref_id="958586" ref_url="https://bugzilla.suse.com/958586" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<description>
This update for Samba fixes the following security issues:

- CVE-2015-5330: Remote read memory exploit in LDB (bnc#958586)
- CVE-2015-5252: Insufficient symlink verification (file access outside the share) (bnc#958582)
- CVE-2015-5296: No man in the middle protection when forcing smb encryption on the client side (bnc#958584)
- CVE-2015-5299: Currently the snapshot browsing is not secure thru windows previous version (shadow_copy2) (bnc#958583)

Non-security issues fixed:

- Prevent null pointer access in samlogon fallback when security credentials are null (bnc#949022)
- Ensure samlogon fall-back requests are rerouted after kerberos failure (bnc#953382)
- Ensure 'Your account is disabled' message is displayed when attempting to ssh into locked account (bnc#953382)
- Address unrecoverable winbind failure: 'key length too large' (bnc#934299)
- Take resource group sids into account when caching netsamlogon data (bnc#912457)
- Fix lookup of groups with 'Local Domain' scope from Active Directory (bnc#948244)
- dependency issue with samba-winbind (bnc#936909)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-19"/>
	<updated date="2016-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/295284">SUSE bug 295284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912457">SUSE bug 912457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934299">SUSE bug 934299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936909">SUSE bug 936909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948244">SUSE bug 948244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949022">SUSE bug 949022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953382">SUSE bug 953382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567124" comment="libldb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567125" comment="libldb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567126" comment="libsmbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567127" comment="libsmbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567128" comment="libtalloc2-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567129" comment="libtalloc2-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567130" comment="libtdb1-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567131" comment="libtdb1-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567132" comment="libtevent0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567133" comment="libtevent0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567134" comment="libwbclient0-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567135" comment="libwbclient0-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567136" comment="samba-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567137" comment="samba-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567138" comment="samba-client-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567139" comment="samba-client-32bit-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567140" comment="samba-doc-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567141" comment="samba-krb-printing-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567142" comment="samba-winbind-3.6.3-64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567143" comment="samba-winbind-32bit-3.6.3-64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78618" version="1" class="patch">
	<metadata>
		<title>Security update for sblim-sfcb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="942628" ref_url="https://bugzilla.suse.com/942628" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<description>

This update of sblim-sfcb fixes a potential NULL pointer crash in lookupProviders() (CVE-2015-5185).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567144" comment="sblim-sfcb-1.3.11-0.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78619" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="821985" ref_url="https://bugzilla.suse.com/821985" source="BUGZILLA"/>
		<reference ref_id="860991" ref_url="https://bugzilla.suse.com/860991" source="BUGZILLA"/>
		<reference ref_id="964844" ref_url="https://bugzilla.suse.com/964844" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001850.html" source="SUSE-SU"/>
		<description>

This update for socat fixes the following issues:

- CVE-2013-3571: Fix a file descriptor leak that could have been misused for a denial of service attack against socat running in server mode (bsc#821985)
- CVE-2014-0019: PROXY-CONNECT address was vulnerable to a stack buffer overflow (bsc#860991)
- Fix a stack overflow in the parser that could have been leveraged to execute arbitrary code (bsc#964844)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964844">SUSE bug 964844</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567448" comment="socat-1.7.0.0-1.18.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78620" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="953817" ref_url="https://bugzilla.suse.com/953817" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<description>
The strongswan package was updated to fix the following security issue:

- CVE-2015-8023: Fixed an authentication bypass vulnerability in the eap-mschapv2 plugin (bsc#953817).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-03"/>
	<updated date="2015-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567148" comment="strongswan-4.4.0-6.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567149" comment="strongswan-doc-4.4.0-6.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78621" version="1" class="patch">
	<metadata>
		<title>Security update for tidy (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="933588" ref_url="https://bugzilla.suse.com/933588" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522/" source="CVE"/>
		<reference ref_id="CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001586.html" source="SUSE-SU"/>
		<description>

This update fixes two heap-based buffer overflows in tidy/libtidy. These vulnerabilities
could allow remote attackers to cause a denial of service (crash) via vectors involving
a command character in an href. (CVE-2015-5522, CVE-2015-5523)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-26"/>
	<updated date="2015-08-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/933588">SUSE bug 933588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567152" comment="libtidy-1.0-37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78622" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="914890" ref_url="https://bugzilla.suse.com/914890" source="BUGZILLA"/>
		<reference ref_id="916927" ref_url="https://bugzilla.suse.com/916927" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<description>
tiff was updated to fix six security issues found by fuzzing initiatives.

These security issues were fixed:
- CVE-2014-8127: Out-of-bounds write (bnc#914890).
- CVE-2014-8128: Out-of-bounds write (bnc#914890).
- CVE-2014-8129: Out-of-bounds write (bnc#914890).
- CVE-2014-8130: Out-of-bounds write (bnc#914890).
- CVE-2014-9655: Access of uninitialized memory (bnc#916927).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-08-12"/>
	<updated date="2015-08-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567153" comment="libtiff3-3.8.2-141.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567154" comment="libtiff3-32bit-3.8.2-141.160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78623" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="960341" ref_url="https://bugzilla.suse.com/960341" source="BUGZILLA"/>
		<reference ref_id="964225" ref_url="https://bugzilla.suse.com/964225" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<description>

This update for tiff fixes the following issues:

- CVE-2015-8781, CVE-2015-8782, CVE-2015-8783: Out-of-bounds writes for invalid images (bsc#964225)
- CVE-2015-7554: Out-of-bounds Write in the thumbnail and tiffcmp tools (bsc#960341)
		</description>
<advisory from="security@suse.de">
	<issued date="2016-02-05"/>
	<updated date="2016-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567449" comment="libtiff3-3.8.2-141.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567450" comment="libtiff3-32bit-3.8.2-141.163.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78624" version="1" class="patch">
	<metadata>
		<title>Security update for vorbis-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="914439" ref_url="https://bugzilla.suse.com/914439" source="BUGZILLA"/>
		<reference ref_id="914441" ref_url="https://bugzilla.suse.com/914441" source="BUGZILLA"/>
		<reference ref_id="943795" ref_url="https://bugzilla.suse.com/943795" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<description>

vorbis-tools was updated to fix several security issues.

- A buffer overflow in aiff_open() that could be triggered
  by opening prepared malicious files (CVE-2015-6749, bsc#943795).

- A division by zero and integer overflow by crafted WAV files was fixed
  (CVE-2014-9638, CVE-2014-9639, bnc#914439, bnc#914441).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-09"/>
	<updated date="2015-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943795">SUSE bug 943795</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567156" comment="vorbis-tools-1.1.1-174.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78625" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="935158" ref_url="https://bugzilla.suse.com/935158" source="BUGZILLA"/>
		<reference ref_id="941500" ref_url="https://bugzilla.suse.com/941500" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<description>

Wireshark has been updated to 1.12.7. (FATE#319388)

The following vulnerabilities have been fixed:
* Wireshark could crash when adding an item to the protocol tree. wnpa-sec-2015-21 CVE-2015-6241
* Wireshark could attempt to free invalid memory. wnpa-sec-2015-22 CVE-2015-6242
* Wireshark could crash when searching for a protocol dissector. wnpa-sec-2015-23 CVE-2015-6243
* The ZigBee dissector could crash. wnpa-sec-2015-24 CVE-2015-6244
* The GSM RLC/MAC dissector could go into an infinite loop. wnpa-sec-2015-25 CVE-2015-6245
* The WaveAgent dissector could crash. wnpa-sec-2015-26 CVE-2015-6246
* The OpenFlow dissector could go into an infinite loop. wnpa-sec-2015-27 CVE-2015-6247
* Wireshark could crash due to invalid ptvcursor length checking. wnpa-sec-2015-28 CVE-2015-6248
* The WCCP dissector could crash. wnpa-sec-2015-29 CVE-2015-6249
* Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.12.7.html 

Also a fix from 1.12.6 in GSM DTAP was backported. (bnc#935158 CVE-2015-4652)
		</description>
<advisory from="security@suse.de">
	<issued date="2015-09-16"/>
	<updated date="2015-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/935158">SUSE bug 935158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941500">SUSE bug 941500</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563893" comment="wireshark-1.12.7-0.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78626" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="950437" ref_url="https://bugzilla.suse.com/950437" source="BUGZILLA"/>
		<reference ref_id="960382" ref_url="https://bugzilla.suse.com/960382" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712/" source="CVE"/>
		<reference ref_id="CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713/" source="CVE"/>
		<reference ref_id="CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715/" source="CVE"/>
		<reference ref_id="CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716/" source="CVE"/>
		<reference ref_id="CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<description>

This update contains Wireshark 1.12.9 and fixes the following issues:

* CVE-2015-7830: pcapng file parser could crash while copying an interface filter (bsc#950437)
* CVE-2015-8711: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8712: The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8713: epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
* CVE-2015-8714: The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8715: epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
* CVE-2015-8716: The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8717: The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8718: Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the 'Match MSG/RES packets for async NLM' option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8719: The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8720: The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
* CVE-2015-8721: Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
* CVE-2015-8722: epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
* CVE-2015-8723: The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted
* CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8725: The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
* CVE-2015-8726: wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8727: The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
* CVE-2015-8728: The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
* CVE-2015-8729: The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
* CVE-2015-8730: epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
* CVE-2015-8731: The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8732: The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
* CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

		</description>
<advisory from="security@suse.de">
	<issued date="2016-01-13"/>
	<updated date="2016-01-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009563895" comment="wireshark-1.12.9-0.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78627" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="930077" ref_url="https://bugzilla.suse.com/930077" source="BUGZILLA"/>
		<reference ref_id="930078" ref_url="https://bugzilla.suse.com/930078" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<description>
wpa_supplicant was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd and wpa_supplicant, when used for AP mode MLME/SME functionality, allowed remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read (bsc#930078).
- CVE-2015-4141: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), allowed remote attackers to cause a denial of service (crash) via a negative chunk length, which triggered an out-of-bounds read or heap-based buffer overflow (bsc#930077).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-07"/>
	<updated date="2015-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567160" comment="wpa_supplicant-0.7.1-6.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567161" comment="wpa_supplicant-gui-0.7.1-6.17.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78628" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="925466" ref_url="https://bugzilla.suse.com/925466" source="BUGZILLA"/>
		<reference ref_id="935634" ref_url="https://bugzilla.suse.com/935634" source="BUGZILLA"/>
		<reference ref_id="938344" ref_url="https://bugzilla.suse.com/938344" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html" source="SUSE-SU"/>
		<description>
xen was updated to fix two security issues.

These security issues were fixed:
- CVE-2015-3259: xl command line config handling stack overflow (bsc#935634, XSA-137).
- CVE-2015-5154: Host code execution via IDE subsystem CD-ROM (bsc#938344).

This non-security issue was fixed:
- Kdump did not work in a XEN environment (bsc#925466).
		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-17"/>
	<updated date="2015-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/925466">SUSE bug 925466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567451" comment="xen-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567452" comment="xen-doc-html-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567453" comment="xen-kmp-default-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567454" comment="xen-kmp-pae-4.4.2_10_3.0.101_63-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567455" comment="xen-libs-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567456" comment="xen-libs-32bit-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567457" comment="xen-tools-4.4.2_10-5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567458" comment="xen-tools-domU-4.4.2_10-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78629" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="901488" ref_url="https://bugzilla.suse.com/901488" source="BUGZILLA"/>
		<reference ref_id="907514" ref_url="https://bugzilla.suse.com/907514" source="BUGZILLA"/>
		<reference ref_id="910258" ref_url="https://bugzilla.suse.com/910258" source="BUGZILLA"/>
		<reference ref_id="918984" ref_url="https://bugzilla.suse.com/918984" source="BUGZILLA"/>
		<reference ref_id="923967" ref_url="https://bugzilla.suse.com/923967" source="BUGZILLA"/>
		<reference ref_id="932267" ref_url="https://bugzilla.suse.com/932267" source="BUGZILLA"/>
		<reference ref_id="944463" ref_url="https://bugzilla.suse.com/944463" source="BUGZILLA"/>
		<reference ref_id="944697" ref_url="https://bugzilla.suse.com/944697" source="BUGZILLA"/>
		<reference ref_id="945167" ref_url="https://bugzilla.suse.com/945167" source="BUGZILLA"/>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="949138" ref_url="https://bugzilla.suse.com/949138" source="BUGZILLA"/>
		<reference ref_id="949549" ref_url="https://bugzilla.suse.com/949549" source="BUGZILLA"/>
		<reference ref_id="950367" ref_url="https://bugzilla.suse.com/950367" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<description>
xen was updated to version 4.4.3 to fix nine security issues.

These security issues were fixed:
- CVE-2015-4037: The slirp_smb function in net/slirp.c created temporary files with predictable names, which allowed local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program (bsc#932267).
- CVE-2014-0222: Integer overflow in the qcow_open function allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2015-7835: Uncontrolled creation of large page mappings by PV guests (bsc#950367).
- CVE-2015-7311: libxl in Xen did not properly handle the readonly flag on disks when using the qemu-xen device model, which allowed local guest users to write to a read-only disk image (bsc#947165).
- CVE-2015-5239: Integer overflow in vnc_client_read() and protocol_client_msg() (bsc#944463).
- CVE-2015-6815: With e1000 NIC emulation support it was possible to enter an infinite loop (bsc#944697).
- CVE-2015-7969: Leak of main per-domain vcpu pointer array leading to denial of service (bsc#950703).
- CVE-2015-7969: Leak of per-domain profiling- related vcpu pointer array leading to denial of service (bsc#950705).
- CVE-2015-7971: Some pmu and profiling hypercalls log without rate limiting (bsc#950706).

These non-security issues were fixed:
- bsc#907514: Bus fatal error: SLES 12 sudden reboot has been observed
- bsc#910258: SLES12 Xen host crashes with FATAL NMI after shutdown of guest with VT-d NIC
- bsc#918984: Bus fatal error: SLES11-SP4 sudden reboot has been observed
- bsc#923967: Partner-L3: Bus fatal error: SLES11-SP3 sudden reboot has been observed
- bnc#901488: Intel ixgbe driver assigns rx/tx queues per core resulting in irq problems on servers with a large amount of CPU cores
- bsc#945167: Running command: xl pci-assignable-add 03:10.1 secondly show errors
- bsc#949138: Setting vcpu affinity under Xen causes libvirtd abort
- bsc#949549: xm create hangs when maxmen value is enclosed in quotes
		</description>
<advisory from="security@suse.de">
	<issued date="2015-10-29"/>
	<updated date="2015-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901488">SUSE bug 901488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907514">SUSE bug 907514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910258">SUSE bug 910258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918984">SUSE bug 918984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923967">SUSE bug 923967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945167">SUSE bug 945167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949138">SUSE bug 949138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949549">SUSE bug 949549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567459" comment="xen-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567460" comment="xen-doc-html-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567461" comment="xen-kmp-default-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567462" comment="xen-kmp-pae-4.4.3_02_3.0.101_65-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567463" comment="xen-libs-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567464" comment="xen-libs-32bit-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567465" comment="xen-tools-4.4.3_02-26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567466" comment="xen-tools-domU-4.4.3_02-26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78630" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="864391" ref_url="https://bugzilla.suse.com/864391" source="BUGZILLA"/>
		<reference ref_id="864655" ref_url="https://bugzilla.suse.com/864655" source="BUGZILLA"/>
		<reference ref_id="864673" ref_url="https://bugzilla.suse.com/864673" source="BUGZILLA"/>
		<reference ref_id="864678" ref_url="https://bugzilla.suse.com/864678" source="BUGZILLA"/>
		<reference ref_id="864682" ref_url="https://bugzilla.suse.com/864682" source="BUGZILLA"/>
		<reference ref_id="864769" ref_url="https://bugzilla.suse.com/864769" source="BUGZILLA"/>
		<reference ref_id="864805" ref_url="https://bugzilla.suse.com/864805" source="BUGZILLA"/>
		<reference ref_id="864811" ref_url="https://bugzilla.suse.com/864811" source="BUGZILLA"/>
		<reference ref_id="877642" ref_url="https://bugzilla.suse.com/877642" source="BUGZILLA"/>
		<reference ref_id="897654" ref_url="https://bugzilla.suse.com/897654" source="BUGZILLA"/>
		<reference ref_id="901508" ref_url="https://bugzilla.suse.com/901508" source="BUGZILLA"/>
		<reference ref_id="902737" ref_url="https://bugzilla.suse.com/902737" source="BUGZILLA"/>
		<reference ref_id="924018" ref_url="https://bugzilla.suse.com/924018" source="BUGZILLA"/>
		<reference ref_id="928393" ref_url="https://bugzilla.suse.com/928393" source="BUGZILLA"/>
		<reference ref_id="945404" ref_url="https://bugzilla.suse.com/945404" source="BUGZILLA"/>
		<reference ref_id="945989" ref_url="https://bugzilla.suse.com/945989" source="BUGZILLA"/>
		<reference ref_id="954872" ref_url="https://bugzilla.suse.com/954872" source="BUGZILLA"/>
		<reference ref_id="956829" ref_url="https://bugzilla.suse.com/956829" source="BUGZILLA"/>
		<reference ref_id="957162" ref_url="https://bugzilla.suse.com/957162" source="BUGZILLA"/>
		<reference ref_id="957988" ref_url="https://bugzilla.suse.com/957988" source="BUGZILLA"/>
		<reference ref_id="958007" ref_url="https://bugzilla.suse.com/958007" source="BUGZILLA"/>
		<reference ref_id="958009" ref_url="https://bugzilla.suse.com/958009" source="BUGZILLA"/>
		<reference ref_id="958491" ref_url="https://bugzilla.suse.com/958491" source="BUGZILLA"/>
		<reference ref_id="958523" ref_url="https://bugzilla.suse.com/958523" source="BUGZILLA"/>
		<reference ref_id="958917" ref_url="https://bugzilla.suse.com/958917" source="BUGZILLA"/>
		<reference ref_id="959005" ref_url="https://bugzilla.suse.com/959005" source="BUGZILLA"/>
		<reference ref_id="959387" ref_url="https://bugzilla.suse.com/959387" source="BUGZILLA"/>
		<reference ref_id="959695" ref_url="https://bugzilla.suse.com/959695" source="BUGZILLA"/>
		<reference ref_id="959928" ref_url="https://bugzilla.suse.com/959928" source="BUGZILLA"/>
		<reference ref_id="960334" ref_url="https://bugzilla.suse.com/960334" source="BUGZILLA"/>
		<reference ref_id="960707" ref_url="https://bugzilla.suse.com/960707" source="BUGZILLA"/>
		<reference ref_id="960725" ref_url="https://bugzilla.suse.com/960725" source="BUGZILLA"/>
		<reference ref_id="960835" ref_url="https://bugzilla.suse.com/960835" source="BUGZILLA"/>
		<reference ref_id="960861" ref_url="https://bugzilla.suse.com/960861" source="BUGZILLA"/>
		<reference ref_id="960862" ref_url="https://bugzilla.suse.com/960862" source="BUGZILLA"/>
		<reference ref_id="961332" ref_url="https://bugzilla.suse.com/961332" source="BUGZILLA"/>
		<reference ref_id="961358" ref_url="https://bugzilla.suse.com/961358" source="BUGZILLA"/>
		<reference ref_id="961691" ref_url="https://bugzilla.suse.com/961691" source="BUGZILLA"/>
		<reference ref_id="962320" ref_url="https://bugzilla.suse.com/962320" source="BUGZILLA"/>
		<reference ref_id="963782" ref_url="https://bugzilla.suse.com/963782" source="BUGZILLA"/>
		<reference ref_id="963923" ref_url="https://bugzilla.suse.com/963923" source="BUGZILLA"/>
		<reference ref_id="964413" ref_url="https://bugzilla.suse.com/964413" source="BUGZILLA"/>
		<reference ref_id="965315" ref_url="https://bugzilla.suse.com/965315" source="BUGZILLA"/>
		<reference ref_id="965317" ref_url="https://bugzilla.suse.com/965317" source="BUGZILLA"/>
		<reference ref_id="967012" ref_url="https://bugzilla.suse.com/967012" source="BUGZILLA"/>
		<reference ref_id="967013" ref_url="https://bugzilla.suse.com/967013" source="BUGZILLA"/>
		<reference ref_id="967630" ref_url="https://bugzilla.suse.com/967630" source="BUGZILLA"/>
		<reference ref_id="967969" ref_url="https://bugzilla.suse.com/967969" source="BUGZILLA"/>
		<reference ref_id="969121" ref_url="https://bugzilla.suse.com/969121" source="BUGZILLA"/>
		<reference ref_id="969122" ref_url="https://bugzilla.suse.com/969122" source="BUGZILLA"/>
		<reference ref_id="969350" ref_url="https://bugzilla.suse.com/969350" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527/" source="CVE"/>
		<reference ref_id="CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529/" source="CVE"/>
		<reference ref_id="CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3689" ref_url="https://www.suse.com/security/cve/CVE-2014-3689/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2014-9718" ref_url="https://www.suse.com/security/cve/CVE-2014-9718/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2015-8817" ref_url="https://www.suse.com/security/cve/CVE-2015-8817/" source="CVE"/>
		<reference ref_id="CVE-2015-8818" ref_url="https://www.suse.com/security/cve/CVE-2015-8818/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<description>
xen was updated to fix 47 security issues.

These security issues were fixed:
- CVE-2013-4527: Buffer overflow in hw/timer/hpet.c might have allowed remote attackers to execute arbitrary code via vectors related to the number of timers (bnc#864673).
- CVE-2013-4529: Buffer overflow in hw/pci/pcie_aer.c allowed remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image (bnc#864678).
- CVE-2013-4530: Buffer overflow in hw/ssi/pl022.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image (bnc#864682).
- CVE-2013-4533: Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image (bsc#864655).
- CVE-2013-4534: Buffer overflow in hw/intc/openpic.c allowed remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements (bsc#864811).
- CVE-2013-4537: The ssi_sd_transfer function in hw/sd/ssi-sd.c allowed remote attackers to execute arbitrary code via a crafted arglen value in a savevm image (bsc#864391).
- CVE-2013-4538: Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image (bsc#864769).
- CVE-2013-4539: Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c might have allowed remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image (bsc#864805).
- CVE-2014-0222: Integer overflow in the qcow_open function in block/qcow.c allowed remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image (bsc#877642).
- CVE-2014-3640: The sosendto function in slirp/udp.c allowed local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket (bsc#897654).
- CVE-2014-3689: The vmware-vga driver (hw/display/vmware_vga.c) allowed local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling (bsc#901508).
- CVE-2014-7815: The set_pixel_format function in ui/vnc.c allowed remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value (bsc#902737).
- CVE-2014-9718: The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality had multiple interpretations of a function's return value, which allowed guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions (bsc#928393).
- CVE-2015-1779: The VNC websocket frame decoder allowed remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section (bsc#924018).
- CVE-2015-5278: Infinite loop in ne2000_receive() function (bsc#945989).
- CVE-2015-6855: hw/ide/core.c did not properly restrict the commands accepted by an ATAPI device, which allowed guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash (bsc#945404).
- CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c, when a guest NIC has a larger MTU, allowed remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet (bsc#957162).
- CVE-2015-7549: pci: NULL pointer dereference issue (bsc#958917).
- CVE-2015-8345: eepro100: infinite loop in processing command block list (bsc#956829).
- CVE-2015-8504: VNC: floating point exception (bsc#958491).
- CVE-2015-8550: Paravirtualized drivers were incautious about shared memory contents (XSA-155) (bsc#957988).
- CVE-2015-8554: qemu-dm buffer overrun in MSI-X handling (XSA-164) (bsc#958007).
- CVE-2015-8555: Information leak in legacy x86 FPU/XMM initialization (XSA-165) (bsc#958009).
- CVE-2015-8558: Infinite loop in ehci_advance_state resulted in DoS (bsc#959005).
- CVE-2015-8567: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8568: vmxnet3: host memory leakage (bsc#959387).
- CVE-2015-8613: SCSI: stack based buffer overflow in megasas_ctrl_get_info (bsc#961358).
- CVE-2015-8619: Stack based OOB write in hmp_sendkey routine (bsc#960334).
- CVE-2015-8743: ne2000: OOB memory access in ioport r/w functions (bsc#960725).
- CVE-2015-8744: vmxnet3: Incorrect l2 header validation lead to a crash via assert(2) call (bsc#960835).
- CVE-2015-8745: Reading IMR registers lead to a crash via assert(2) call (bsc#960707).
- CVE-2015-8817: OOB access in address_space_rw lead to segmentation fault (I) (bsc#969121).
- CVE-2015-8818: OOB access in address_space_rw lead to segmentation fault (II) (bsc#969122).
- CVE-2016-1568: AHCI use-after-free vulnerability in aio port commands (bsc#961332).
- CVE-2016-1570: The PV superpage functionality in arch/x86/mm.c allowed local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates (bsc#960861).
- CVE-2016-1571: VMX: intercept issue with INVLPG on non-canonical address (XSA-168) (bsc#960862).
- CVE-2016-1714: nvram: OOB r/w access in processing firmware configurations (bsc#961691).
- CVE-2016-1922: NULL pointer dereference in vapic_write() (bsc#962320).
- CVE-2016-1981: e1000 infinite loop in start_xmit and e1000_receive_iov routines (bsc#963782).
- CVE-2016-2198: EHCI NULL pointer dereference in ehci_caps_write (bsc#964413).
- CVE-2016-2270: Xen allowed local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings (bsc#965315).
- CVE-2016-2271: VMX when using an Intel or Cyrix CPU, allowed local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP (bsc#965317).
- CVE-2016-2391: usb: multiple eof_timers in ohci module lead to NULL pointer dereference (bsc#967013).
- CVE-2016-2392: NULL pointer dereference in remote NDIS control message handling (bsc#967012).
- CVE-2016-2538: Integer overflow in remote NDIS control message handling (bsc#967969).
- CVE-2016-2841: ne2000: Infinite loop in ne2000_receive (bsc#969350).
- XSA-166: ioreq handling possibly susceptible to multiple read issue (bsc#958523).

These non-security issues were fixed:
- bsc#954872: script block-dmmd not working as expected 
- bsc#963923: domain weights not honored when sched-credit tslice is reduced
- bsc#959695: Missing docs for xen
- bsc#967630: Discrepancy in reported memory size with correction XSA-153 for xend
- bsc#959928: When DomU is in state running xm domstate returned nothing
		</description>
<advisory from="security@suse.de">
	<issued date="2016-04-05"/>
	<updated date="2016-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901508">SUSE bug 901508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928393">SUSE bug 928393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954872">SUSE bug 954872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958523">SUSE bug 958523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959695">SUSE bug 959695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959928">SUSE bug 959928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963923">SUSE bug 963923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967630">SUSE bug 967630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969121">SUSE bug 969121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969122">SUSE bug 969122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3689/">CVE-2014-3689</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9718/">CVE-2014-9718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8817/">CVE-2015-8817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8818/">CVE-2015-8818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567467" comment="xen-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567468" comment="xen-doc-html-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567469" comment="xen-kmp-default-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567470" comment="xen-kmp-pae-4.4.4_02_3.0.101_68-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567471" comment="xen-libs-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567472" comment="xen-libs-32bit-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567473" comment="xen-tools-4.4.4_02-32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567474" comment="xen-tools-domU-4.4.4_02-32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78631" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="947165" ref_url="https://bugzilla.suse.com/947165" source="BUGZILLA"/>
		<reference ref_id="950703" ref_url="https://bugzilla.suse.com/950703" source="BUGZILLA"/>
		<reference ref_id="950704" ref_url="https://bugzilla.suse.com/950704" source="BUGZILLA"/>
		<reference ref_id="950705" ref_url="https://bugzilla.suse.com/950705" source="BUGZILLA"/>
		<reference ref_id="950706" ref_url="https://bugzilla.suse.com/950706" source="BUGZILLA"/>
		<reference ref_id="951845" ref_url="https://bugzilla.suse.com/951845" source="BUGZILLA"/>
		<reference ref_id="954018" ref_url="https://bugzilla.suse.com/954018" source="BUGZILLA"/>
		<reference ref_id="954405" ref_url="https://bugzilla.suse.com/954405" source="BUGZILLA"/>
		<reference ref_id="955399" ref_url="https://bugzilla.suse.com/955399" source="BUGZILLA"/>
		<reference ref_id="956408" ref_url="https://bugzilla.suse.com/956408" source="BUGZILLA"/>
		<reference ref_id="956409" ref_url="https://bugzilla.suse.com/956409" source="BUGZILLA"/>
		<reference ref_id="956411" ref_url="https://bugzilla.suse.com/956411" source="BUGZILLA"/>
		<reference ref_id="956592" ref_url="https://bugzilla.suse.com/956592" source="BUGZILLA"/>
		<reference ref_id="956832" ref_url="https://bugzilla.suse.com/956832" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<description>

      This update fixes the following security issues:

- bsc#955399 -  Fix xm migrate --log_progress.
  Due to logic error progress was not logged when requested.

- bsc#956832 -  CVE-2015-8345: xen: qemu: net: eepro100:
  infinite loop in processing command block list

- bsc#956592 -  xen: virtual PMU is unsupported (XSA-163)

- bsc#956408 -  CVE-2015-8339, CVE-2015-8340: xen:
  XENMEM_exchange error handling issues (XSA-159)

- bsc#956409 -  CVE-2015-8341: xen: libxl leak of pv kernel
  and initrd on error (XSA-160)

- bsc#956411 -  CVE-2015-7504: xen: heap buffer overflow
  vulnerability in pcnet emulator (XSA-162)

- bsc#947165 -  CVE-2015-7311: xen: libxl fails to honour
  readonly flag on disks with qemu-xen (xsa-142)

- bsc#955399 -  Fix xm migrate --live.  The options were not passed
  due to a merge error. As a result the migration was not live,
  instead the suspended guest was migrated.

- bsc#954405 -  CVE-2015-8104: Xen: guest to host DoS by
  triggering an infinite loop in microcode via #DB exception

- bsc#954018 -  CVE-2015-5307: xen: x86: CPU lockup during
  fault delivery (XSA-156)


- bsc#950704 -  CVE-2015-7970: xen: x86: Long latency
  populate-on-demand operation is not preemptible (XSA-150)

- bsc#951845 -  CVE-2015-7972: xen: x86: populate-on-demand
  balloon size inaccuracy can crash guests (XSA-153)

- Drop 5604f239-x86-PV-properly-populate-descriptor-tables.patch

- bsc#950703 -  CVE-2015-7969: xen: leak of main per-domain
  vcpu pointer array (DoS) (XSA-149)

- bsc#950705 -  CVE-2015-7969: xen: x86: leak of per-domain
  profiling-related vcpu pointer array (DoS) (XSA-151)

- bsc#950706 -  CVE-2015-7971: xen: x86: some pmu and
  profiling hypercalls log without rate limiting (XSA-152)		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-22"/>
	<updated date="2015-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955399">SUSE bug 955399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956592">SUSE bug 956592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567475" comment="xen-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567476" comment="xen-doc-html-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567477" comment="xen-kmp-default-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567478" comment="xen-kmp-pae-4.4.3_06_3.0.101_65-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567479" comment="xen-libs-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567480" comment="xen-libs-32bit-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567481" comment="xen-tools-4.4.3_06-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567482" comment="xen-tools-domU-4.4.3_06-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78632" version="1" class="patch">
	<metadata>
		<title>Security update for xfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="911866" ref_url="https://bugzilla.suse.com/911866" source="BUGZILLA"/>
		<reference ref_id="939367" ref_url="https://bugzilla.suse.com/939367" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<description>
xfsprogs was updated to fix one security vulnerability and several bugs.

- Handle unwanted data disclosure in xfs_metadump (bsc#939367, CVE-2012-2150)
- Fix segfault during xfs_repair run (bsc#911866)
- Fix definition of leaf attribute block to avoid gcc optimization xfsprogs-fix-leaf-block-definition
		</description>
<advisory from="security@suse.de">
	<issued date="2015-12-28"/>
	<updated date="2015-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/911866">SUSE bug 911866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567270" comment="xfsprogs-3.1.8-0.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78633" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="927220" ref_url="https://bugzilla.suse.com/927220" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7439" ref_url="https://www.suse.com/security/cve/CVE-2013-7439/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001521.html" source="SUSE-SU"/>
		<description>
xorg-x11-libX11 was updated to fix one security issue.

This security issue was fixed:
- CVE-2013-7439: Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLen macros in include/X11/Xlibint.h in X11R6.x and libX11 before 1.6.0 allowed remote attackers to have unspecified impact via a crafted request, which triggered a buffer overflow (bsc#927220).
  		</description>
<advisory from="security@suse.de">
	<issued date="2015-07-27"/>
	<updated date="2015-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/927220">SUSE bug 927220</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7439/">CVE-2013-7439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009567274" comment="xorg-x11-libX11-7.4-5.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567275" comment="xorg-x11-libX11-32bit-7.4-5.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78634" version="1" class="patch">
	<metadata>
		<title>Security update for xscreensaver (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 11 SP4</platform>
		</affected>
		<reference ref_id="952062" ref_url="https://bugzilla.suse.com/952062" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<description>
The xscreensaver package was updated to fix the following security and non security issues:

- CVE-2015-8025: Fixed a crash when hot-swapping monitors while locked (bsc#952062).
- Added xscreensaver-in_signal_handler_p.patch needed for fix of signal handling.
- Refresh xscreensaver-stars.patch.
		</description>
<advisory from="security@suse.de">
	<issued date="2015-11-20"/>
	<updated date="2015-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse_sled:11:sp4</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009117401" comment="SUSE Linux Enterprise Desktop 11 SP4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009567286" comment="xscreensaver-5.07-6.36.1 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565839" version="1" comment="ImageMagick is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565840" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565841" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565842" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565843" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073771" version="1" comment="sled-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565844" version="1" comment="Mesa is &lt;7.11.2-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565845" version="1" comment="Mesa-32bit is &lt;7.11.2-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565846" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565847" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565848" version="1" comment="acroread is &lt;9.5.5-0.5.5.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565849" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565850" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565851" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565852" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565853" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565854" version="1" comment="acroread_ja is &lt;9.4.2-0.4.1 for i586" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565855" version="1" comment="bind-libs is &lt;9.9.4P2-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565856" version="1" comment="bind-libs-32bit is &lt;9.9.4P2-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565857" version="1" comment="bind-utils is &lt;9.9.4P2-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565858" version="1" comment="bogofilter is &lt;1.1.1-174.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565859" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565860" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565861" version="1" comment="mono-core is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565862" version="1" comment="mono-data is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565863" version="1" comment="mono-data-firebird is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565864" version="1" comment="mono-data-oracle is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565865" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565866" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565867" version="1" comment="mono-data-sybase is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565868" version="1" comment="mono-devel is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565869" version="1" comment="mono-extras is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565870" version="1" comment="mono-jscript is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565871" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565872" version="1" comment="mono-nunit is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565873" version="1" comment="mono-wcf is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565874" version="1" comment="mono-web is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565875" version="1" comment="mono-winforms is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565876" version="1" comment="monodoc-core is &lt;2.6.7-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565877" version="1" comment="libldb1 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565878" version="1" comment="libldb1-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565879" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565880" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565881" version="1" comment="libtalloc1 is &lt;3.4.3-1.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565882" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565883" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565884" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565885" version="1" comment="libtdb1 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565886" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565887" version="1" comment="libtevent0 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565888" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565889" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565890" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565891" version="1" comment="samba is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565892" version="1" comment="samba-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565893" version="1" comment="samba-client is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565894" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565895" version="1" comment="samba-doc is &lt;3.6.3-0.33.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565896" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565897" version="1" comment="samba-winbind is &lt;3.6.3-0.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565898" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565899" version="1" comment="clamav is &lt;0.97.8-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565900" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565901" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565902" version="1" comment="coreutils is &lt;8.12-6.25.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565903" version="1" comment="coreutils-lang is &lt;8.12-6.25.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565904" version="1" comment="cups is &lt;1.3.9-8.46.48.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565905" version="1" comment="cups-client is &lt;1.3.9-8.46.48.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565906" version="1" comment="cups-libs is &lt;1.3.9-8.46.48.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565907" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565908" version="1" comment="curl is &lt;7.19.7-1.20.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565909" version="1" comment="libcurl4 is &lt;7.19.7-1.20.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565910" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565911" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565912" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565913" version="1" comment="finch is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565914" version="1" comment="libpurple is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565915" version="1" comment="libpurple-lang is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565916" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565917" version="1" comment="libpurple-tcl is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565918" version="1" comment="pidgin is &lt;2.6.6-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565919" version="1" comment="MozillaFirefox is &lt;10.0.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565920" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.80 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565921" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565922" version="1" comment="libfreebl3 is &lt;3.13.6-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565923" version="1" comment="libfreebl3-32bit is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565924" version="1" comment="mozilla-nspr is &lt;4.9.2-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565925" version="1" comment="mozilla-nspr-32bit is &lt;4.9.2-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565926" version="1" comment="mozilla-nss is &lt;3.13.6-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565927" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565928" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565929" version="1" comment="MozillaFirefox is &lt;10.0.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565930" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.85 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565931" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565932" version="1" comment="MozillaFirefox is &lt;10.0.10-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565933" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565934" version="1" comment="mozilla-nspr is &lt;4.9.3-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565935" version="1" comment="mozilla-nspr-32bit is &lt;4.9.3-0.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565936" version="1" comment="MozillaFirefox is &lt;10.0.11-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565937" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565938" version="1" comment="libfreebl3 is &lt;3.14-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565939" version="1" comment="libfreebl3-32bit is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565940" version="1" comment="mozilla-nss is &lt;3.14-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565941" version="1" comment="mozilla-nss-32bit is &lt;3.14-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565942" version="1" comment="mozilla-nss-tools is &lt;3.14-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565943" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565944" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565945" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565946" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565947" version="1" comment="mozilla-nspr is &lt;4.9.4-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565948" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565949" version="1" comment="mozilla-nss is &lt;3.14.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565950" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565951" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565952" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565953" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565954" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565955" version="1" comment="beagle is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565956" version="1" comment="beagle-evolution is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565957" version="1" comment="beagle-firefox is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565958" version="1" comment="beagle-gui is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565959" version="1" comment="beagle-lang is &lt;0.3.8-56.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565960" version="1" comment="libfreebl3 is &lt;3.14.2-0.4.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565961" version="1" comment="libfreebl3-32bit is &lt;3.14.2-0.4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565962" version="1" comment="mhtml-firefox is &lt;0.5-1.47.51.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565963" version="1" comment="mozilla-nspr is &lt;4.9.5-0.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565964" version="1" comment="mozilla-nspr-32bit is &lt;4.9.5-0.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565965" version="1" comment="mozilla-nss is &lt;3.14.2-0.4.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565966" version="1" comment="mozilla-nss-32bit is &lt;3.14.2-0.4.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565967" version="1" comment="mozilla-nss-tools is &lt;3.14.2-0.4.3.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565968" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565969" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565970" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565971" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565972" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565973" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565974" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565975" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565976" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565977" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565978" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565979" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565980" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565981" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.31 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565982" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565983" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565984" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.62 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565985" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565986" version="1" comment="flash-player is &lt;11.2.202.336-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565987" version="1" comment="flash-player-gnome is &lt;11.2.202.336-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565988" version="1" comment="flash-player-kde4 is &lt;11.2.202.336-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565989" version="1" comment="freetype2 is &lt;2.3.7-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565990" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565991" version="1" comment="freetype2-devel is &lt;2.3.7-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565992" version="1" comment="ft2demos is &lt;2.3.7-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565993" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565994" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565995" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565996" version="1" comment="ghostscript-library is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565997" version="1" comment="ghostscript-omni is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565998" version="1" comment="ghostscript-x11 is &lt;8.62-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009565999" version="1" comment="libgimpprint is &lt;4.2.7-32.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566000" version="1" comment="glibc is &lt;2.11.3-17.45.49.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566001" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566002" version="1" comment="glibc-devel is &lt;2.11.3-17.45.49.1 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566003" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566004" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566005" version="1" comment="glibc-locale is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566006" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566007" version="1" comment="nscd is &lt;2.11.3-17.45.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566008" version="1" comment="gnutls is &lt;2.4.1-24.39.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566009" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.47.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566010" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566011" version="1" comment="gpg2 is &lt;2.0.9-25.33.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566012" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566013" version="1" comment="gtk2 is &lt;2.18.9-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566014" version="1" comment="gtk2-32bit is &lt;2.18.9-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566015" version="1" comment="gtk2-devel is &lt;2.18.9-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566016" version="1" comment="gtk2-lang is &lt;2.18.9-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566017" version="1" comment="hplip is &lt;3.11.10-0.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566018" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566019" version="1" comment="icedtea-web is &lt;1.4.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562934" version="1" comment="icu is &lt;4.0-7.26.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566020" version="1" comment="libicu is &lt;4.0-7.26.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566021" version="1" comment="inkscape is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566022" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566023" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566024" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566025" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566026" version="1" comment="inkscape-lang is &lt;0.46-62.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566027" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.7-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566028" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.7-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566029" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.7-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566030" version="1" comment="kdelibs4 is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566031" version="1" comment="kdelibs4-core is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566032" version="1" comment="libkde4 is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562953" version="1" comment="libkde4-32bit is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566033" version="1" comment="libkdecore4 is &lt;4.3.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562955" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566034" version="1" comment="kernel-default is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566035" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566036" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566037" version="1" comment="kernel-default-extra is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566038" version="1" comment="kernel-pae is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566039" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566040" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566041" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.7.17.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566042" version="1" comment="kernel-source is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566043" version="1" comment="kernel-syms is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566044" version="1" comment="kernel-trace is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566045" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566046" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566047" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566048" version="1" comment="kernel-xen is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566049" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566050" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566051" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.7.17.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566052" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566053" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566054" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566055" version="1" comment="krb5 is &lt;1.6.3-133.49.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566056" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566057" version="1" comment="krb5-client is &lt;1.6.3-133.49.58.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566058" version="1" comment="kvm is &lt;0.15.1-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566059" version="1" comment="lcms is &lt;1.17-77.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566060" version="1" comment="liblcms1 is &lt;1.17-77.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566061" version="1" comment="liblcms1-32bit is &lt;1.17-77.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566062" version="1" comment="libldb1 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566063" version="1" comment="libldb1-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566064" version="1" comment="libsmbclient0 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566065" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566066" version="1" comment="libtalloc2 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566067" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566068" version="1" comment="libtdb1 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566069" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566070" version="1" comment="libtevent0 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566071" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566072" version="1" comment="libwbclient0 is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566073" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566074" version="1" comment="samba is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566075" version="1" comment="samba-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566076" version="1" comment="samba-client is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566077" version="1" comment="samba-client-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566078" version="1" comment="samba-doc is &lt;3.6.3-0.24.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566079" version="1" comment="samba-krb-printing is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566080" version="1" comment="samba-winbind is &lt;3.6.3-0.24.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566081" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.24.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566082" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566083" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566084" version="1" comment="libqt4 is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566085" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566086" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566087" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566088" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566089" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566090" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566091" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566092" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566093" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566094" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566095" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566096" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566097" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566098" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566099" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566100" version="1" comment="libecpg6 is &lt;9.1.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566101" version="1" comment="libpq5 is &lt;9.1.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566102" version="1" comment="libpq5-32bit is &lt;9.1.9-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566103" version="1" comment="postgresql91 is &lt;9.1.9-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566104" version="1" comment="libgcrypt11 is &lt;1.5.0-0.15.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566105" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566106" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566107" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566108" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566109" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566110" version="1" comment="mysql is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566111" version="1" comment="mysql-client is &lt;5.0.96-0.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566112" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566113" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566114" version="1" comment="openssl is &lt;0.9.8j-0.50.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566115" version="1" comment="libotr2 is &lt;3.2.0-10.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566116" version="1" comment="permissions is &lt;2013.1.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566117" version="1" comment="libpixman-1-0 is &lt;0.16.0-1.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566118" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-1.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566119" version="1" comment="libpixman-1-0-devel is &lt;0.16.0-1.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566120" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566121" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566122" version="1" comment="libpoppler5 is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563015" version="1" comment="poppler-tools is &lt;0.12.3-1.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566123" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566124" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566125" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566126" version="1" comment="libproxy0-config-gnome-32bit is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566127" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566128" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566129" version="1" comment="libproxy0-networkmanager-32bit is &lt;0.3.1-2.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563017" version="1" comment="libreoffice is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563018" version="1" comment="libreoffice-base is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563019" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563020" version="1" comment="libreoffice-base-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563022" version="1" comment="libreoffice-calc is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563023" version="1" comment="libreoffice-calc-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563024" version="1" comment="libreoffice-draw is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563025" version="1" comment="libreoffice-draw-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563026" version="1" comment="libreoffice-filters-optional is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563027" version="1" comment="libreoffice-gnome is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563028" version="1" comment="libreoffice-help-cs is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563029" version="1" comment="libreoffice-help-da is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563030" version="1" comment="libreoffice-help-de is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563031" version="1" comment="libreoffice-help-en-GB is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563032" version="1" comment="libreoffice-help-en-US is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563033" version="1" comment="libreoffice-help-es is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563034" version="1" comment="libreoffice-help-fr is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563035" version="1" comment="libreoffice-help-gu-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563036" version="1" comment="libreoffice-help-hi-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563037" version="1" comment="libreoffice-help-hu is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563038" version="1" comment="libreoffice-help-it is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563039" version="1" comment="libreoffice-help-ja is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563040" version="1" comment="libreoffice-help-ko is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563041" version="1" comment="libreoffice-help-nl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563042" version="1" comment="libreoffice-help-pl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563043" version="1" comment="libreoffice-help-pt is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563044" version="1" comment="libreoffice-help-pt-BR is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563045" version="1" comment="libreoffice-help-ru is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563046" version="1" comment="libreoffice-help-sv is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563047" version="1" comment="libreoffice-help-zh-CN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563048" version="1" comment="libreoffice-help-zh-TW is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563049" version="1" comment="libreoffice-icon-themes is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563050" version="1" comment="libreoffice-impress is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563051" version="1" comment="libreoffice-impress-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563052" version="1" comment="libreoffice-kde is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563053" version="1" comment="libreoffice-kde4 is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563054" version="1" comment="libreoffice-l10n-af is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563055" version="1" comment="libreoffice-l10n-ar is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563056" version="1" comment="libreoffice-l10n-ca is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563057" version="1" comment="libreoffice-l10n-cs is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563058" version="1" comment="libreoffice-l10n-da is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563059" version="1" comment="libreoffice-l10n-de is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563061" version="1" comment="libreoffice-l10n-en-GB is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563062" version="1" comment="libreoffice-l10n-es is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563063" version="1" comment="libreoffice-l10n-fi is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563064" version="1" comment="libreoffice-l10n-fr is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563065" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563066" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563067" version="1" comment="libreoffice-l10n-hu is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563068" version="1" comment="libreoffice-l10n-it is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563069" version="1" comment="libreoffice-l10n-ja is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563070" version="1" comment="libreoffice-l10n-ko is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563071" version="1" comment="libreoffice-l10n-nb is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563072" version="1" comment="libreoffice-l10n-nl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563073" version="1" comment="libreoffice-l10n-nn is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563074" version="1" comment="libreoffice-l10n-pl is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563076" version="1" comment="libreoffice-l10n-pt is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563077" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563078" version="1" comment="libreoffice-l10n-ru is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563079" version="1" comment="libreoffice-l10n-sk is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563080" version="1" comment="libreoffice-l10n-sv is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563081" version="1" comment="libreoffice-l10n-xh is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563082" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563083" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563084" version="1" comment="libreoffice-l10n-zu is &lt;3.5.4.13-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563085" version="1" comment="libreoffice-mailmerge is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563086" version="1" comment="libreoffice-math is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563087" version="1" comment="libreoffice-mono is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563088" version="1" comment="libreoffice-officebean is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563089" version="1" comment="libreoffice-pyuno is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563091" version="1" comment="libreoffice-writer is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563092" version="1" comment="libreoffice-writer-extensions is &lt;3.5.4.13-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566130" version="1" comment="libssh2 is &lt;0.2-5.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566131" version="1" comment="libtiff3 is &lt;3.8.2-141.154.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566132" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566133" version="1" comment="libvirt is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566134" version="1" comment="libvirt-client is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566135" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566136" version="1" comment="libvirt-doc is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566137" version="1" comment="libvirt-python is &lt;0.9.6-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566138" version="1" comment="libvirt is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566139" version="1" comment="libvirt-client is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566140" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566141" version="1" comment="libvirt-doc is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566142" version="1" comment="libvirt-python is &lt;0.9.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566143" version="1" comment="libxml2 is &lt;2.7.6-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566144" version="1" comment="libxml2-32bit is &lt;2.7.6-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566145" version="1" comment="libxml2-python is &lt;2.7.6-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566146" version="1" comment="libxslt is &lt;1.1.24-19.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566147" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566148" version="1" comment="libfreebl3 is &lt;3.15.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566149" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566150" version="1" comment="mozilla-nspr is &lt;4.10.1-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566151" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566152" version="1" comment="mozilla-nss is &lt;3.15.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566153" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566154" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566155" version="1" comment="libfreebl3 is &lt;3.15.3-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566156" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566157" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566158" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566159" version="1" comment="mozilla-nss is &lt;3.15.3-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566160" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566161" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566162" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.4.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566163" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566164" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.4.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566165" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566166" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.4.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566167" version="1" comment="openssh is &lt;5.1p1-41.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566168" version="1" comment="openssh-askpass is &lt;5.1p1-41.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566169" version="1" comment="openssl-certs is &lt;1.95-0.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566170" version="1" comment="openvpn is &lt;2.0.9-143.33.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566171" version="1" comment="perl is &lt;5.10.0-64.61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566172" version="1" comment="perl-32bit is &lt;5.10.0-64.61.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566173" version="1" comment="perl-base is &lt;5.10.0-64.61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566174" version="1" comment="perl-doc is &lt;5.10.0-64.61.61.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566175" version="1" comment="postgresql is &lt;8.3.23-0.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566176" version="1" comment="puppet is &lt;2.6.18-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566177" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566178" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566179" version="1" comment="python is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566180" version="1" comment="python-base is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566181" version="1" comment="python-base-32bit is &lt;2.6.8-0.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566182" version="1" comment="python-curses is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566183" version="1" comment="python-devel is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563127" version="1" comment="python-tk is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566184" version="1" comment="python-xml is &lt;2.6.8-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566185" version="1" comment="ruby is &lt;1.8.7.p357-0.9.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566186" version="1" comment="strongswan is &lt;4.4.0-6.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566187" version="1" comment="strongswan-doc is &lt;4.4.0-6.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566188" version="1" comment="sudo is &lt;1.7.6p2-0.2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563167" version="1" comment="telepathy-gabble is &lt;0.7.10-2.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566189" version="1" comment="telepathy-idle is &lt;0.1.5-1.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566190" version="1" comment="usbmuxd is &lt;1.0.7-5.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566191" version="1" comment="vino is &lt;2.28.1-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566192" version="1" comment="vino-lang is &lt;2.28.1-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563168" version="1" comment="wireshark is &lt;1.8.12-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566193" version="1" comment="xen is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566194" version="1" comment="xen-doc-html is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566195" version="1" comment="xen-doc-pdf is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566196" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566197" version="1" comment="xen-kmp-pae is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566198" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566199" version="1" comment="xen-libs is &lt;4.1.4_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566200" version="1" comment="xen-libs-32bit is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566201" version="1" comment="xen-tools is &lt;4.1.4_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566202" version="1" comment="xen-tools-domU is &lt;4.1.4_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566203" version="1" comment="libvirt is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566204" version="1" comment="libvirt-client is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566205" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566206" version="1" comment="libvirt-doc is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566207" version="1" comment="libvirt-python is &lt;0.9.6-0.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566208" version="1" comment="virt-manager is &lt;0.9.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566209" version="1" comment="vm-install is &lt;0.5.10-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566210" version="1" comment="xen is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566211" version="1" comment="xen-doc-html is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566212" version="1" comment="xen-doc-pdf is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566213" version="1" comment="xen-kmp-default is &lt;4.1.2_20_3.0.38_0.5-0.5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566214" version="1" comment="xen-kmp-trace is &lt;4.1.2_20_3.0.38_0.5-0.5.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566215" version="1" comment="xen-libs is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566216" version="1" comment="xen-libs-32bit is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566217" version="1" comment="xen-tools is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566218" version="1" comment="xen-tools-domU is &lt;4.1.2_20-0.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566219" version="1" comment="vm-install is &lt;0.5.12-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566220" version="1" comment="xen is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566221" version="1" comment="xen-doc-html is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566222" version="1" comment="xen-doc-pdf is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566223" version="1" comment="xen-kmp-default is &lt;4.1.3_02_3.0.38_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566224" version="1" comment="xen-kmp-trace is &lt;4.1.3_02_3.0.38_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566225" version="1" comment="xen-libs is &lt;4.1.3_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566226" version="1" comment="xen-libs-32bit is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566227" version="1" comment="xen-tools is &lt;4.1.3_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566228" version="1" comment="xen-tools-domU is &lt;4.1.3_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566229" version="1" comment="xen is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566230" version="1" comment="xen-doc-html is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566231" version="1" comment="xen-doc-pdf is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566232" version="1" comment="xen-kmp-default is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566233" version="1" comment="xen-kmp-pae is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566234" version="1" comment="xen-kmp-trace is &lt;4.1.3_04_3.0.42_0.7-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566235" version="1" comment="xen-libs is &lt;4.1.3_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566236" version="1" comment="xen-libs-32bit is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566237" version="1" comment="xen-tools is &lt;4.1.3_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566238" version="1" comment="xen-tools-domU is &lt;4.1.3_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566239" version="1" comment="xen is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566240" version="1" comment="xen-doc-html is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566241" version="1" comment="xen-doc-pdf is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566242" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566243" version="1" comment="xen-kmp-pae is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566244" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566245" version="1" comment="xen-libs is &lt;4.1.5_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566246" version="1" comment="xen-libs-32bit is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566247" version="1" comment="xen-tools is &lt;4.1.5_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566248" version="1" comment="xen-tools-domU is &lt;4.1.5_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566249" version="1" comment="xen is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566250" version="1" comment="xen-doc-html is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566251" version="1" comment="xen-doc-pdf is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566252" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566253" version="1" comment="xen-kmp-pae is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566254" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.93_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566255" version="1" comment="xen-libs is &lt;4.1.6_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566256" version="1" comment="xen-libs-32bit is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566257" version="1" comment="xen-tools is &lt;4.1.6_02-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566258" version="1" comment="xen-tools-domU is &lt;4.1.6_02-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566259" version="1" comment="xen is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566260" version="1" comment="xen-doc-html is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566261" version="1" comment="xen-doc-pdf is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566262" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566263" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566264" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.5-0.5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566265" version="1" comment="xen-libs is &lt;4.1.6_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566266" version="1" comment="xen-libs-32bit is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566267" version="1" comment="xen-tools is &lt;4.1.6_04-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566268" version="1" comment="xen-tools-domU is &lt;4.1.6_04-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566269" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.76.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566270" version="1" comment="xorg-x11-server is &lt;7.4-27.70.76.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566271" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.76.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566272" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566273" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566274" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566275" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566276" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566277" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566278" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566279" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566280" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566281" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566282" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566283" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566284" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566285" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566286" version="1" comment="xorg-x11-libXp-devel is &lt;7.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566287" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566288" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566289" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566290" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566291" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566292" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566293" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566294" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566295" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566296" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566297" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566298" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.22.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566299" version="1" comment="zypper is &lt;1.6.166-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566300" version="1" comment="zypper-log is &lt;1.6.166-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566301" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566302" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.48 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566303" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566304" version="1" comment="libfreebl3 is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566305" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566306" version="1" comment="libsoftokn3 is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566307" version="1" comment="libsoftokn3-32bit is &lt;3.16.1-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566308" version="1" comment="mozilla-nspr is &lt;4.10.6-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566309" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566310" version="1" comment="mozilla-nss is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566311" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566312" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077540" version="1" comment="sled-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566313" version="1" comment="ImageMagick is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566314" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566315" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566316" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566317" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566318" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566319" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566320" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.13.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566321" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.13.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566322" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566323" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566324" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566325" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.36 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566326" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566327" version="1" comment="libfreebl3 is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566328" version="1" comment="libfreebl3-32bit is &lt;3.16-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566329" version="1" comment="libsoftokn3 is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566330" version="1" comment="libsoftokn3-32bit is &lt;3.16-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566331" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566332" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566333" version="1" comment="mozilla-nss is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566334" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566335" version="1" comment="mozilla-nss-tools is &lt;3.16-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566336" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566337" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566338" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566339" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566340" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566341" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566342" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566343" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566344" version="1" comment="mozilla-nspr is &lt;4.10.8-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566345" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566346" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566347" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-0.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566348" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566349" version="1" comment="a2ps is &lt;4.13-1326.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566350" version="1" comment="libaugeas0 is &lt;0.9.0-3.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566351" version="1" comment="libaugeas0 is &lt;0.9.0-3.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566352" version="1" comment="bash is &lt;3.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566353" version="1" comment="bash-doc is &lt;3.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563235" version="1" comment="libreadline5 is &lt;5.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566354" version="1" comment="libreadline5-32bit is &lt;5.2-147.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566355" version="1" comment="readline-doc is &lt;5.2-147.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566356" version="1" comment="bind-libs is &lt;9.9.6P1-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566357" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566358" version="1" comment="bind-utils is &lt;9.9.6P1-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566359" version="1" comment="bind-libs is &lt;9.9.6P1-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566360" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566361" version="1" comment="bind-utils is &lt;9.9.6P1-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566362" version="1" comment="bind-libs is &lt;9.9.6P1-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566363" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566364" version="1" comment="bind-utils is &lt;9.9.6P1-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566365" version="1" comment="bind-libs is &lt;9.9.6P1-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566366" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566367" version="1" comment="bind-utils is &lt;9.9.6P1-0.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566368" version="1" comment="binutils is &lt;2.23.1-0.23.15 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566369" version="1" comment="cabextract is &lt;1.2-2.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566370" version="1" comment="cabextract is &lt;1.2-2.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566371" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566372" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566373" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566374" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566375" version="1" comment="compat-wireless-kmp-default is &lt;3.13_3.0.101_0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566376" version="1" comment="compat-wireless-kmp-pae is &lt;3.13_3.0.101_0.31-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566377" version="1" comment="compat-wireless-kmp-xen is &lt;3.13_3.0.101_0.31-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566378" version="1" comment="cpio is &lt;2.9-75.78.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566379" version="1" comment="cpio-lang is &lt;2.9-75.78.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566380" version="1" comment="cups is &lt;1.3.9-8.46.52.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566381" version="1" comment="cups-client is &lt;1.3.9-8.46.52.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566382" version="1" comment="cups-libs is &lt;1.3.9-8.46.52.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566383" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.52.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566384" version="1" comment="curl is &lt;7.19.7-1.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566385" version="1" comment="libcurl4 is &lt;7.19.7-1.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566386" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566387" version="1" comment="curl is &lt;7.19.7-1.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566388" version="1" comment="libcurl4 is &lt;7.19.7-1.46.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566389" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566390" version="1" comment="curl is &lt;7.19.7-1.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566391" version="1" comment="libcurl4 is &lt;7.19.7-1.40.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566392" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566393" version="1" comment="dbus-1 is &lt;1.2.10-3.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566394" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566395" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566396" version="1" comment="dhcp is &lt;4.2.4.P2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566397" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566398" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566399" version="1" comment="e2fsprogs is &lt;1.41.9-2.10.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566400" version="1" comment="libblkid1 is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009440332" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009101461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566401" version="1" comment="libcom_err2 is &lt;1.41.9-2.10.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566402" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.10.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566403" version="1" comment="libext2fs2 is &lt;1.41.9-2.10.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566404" version="1" comment="libuuid-devel is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566405" version="1" comment="libuuid1 is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009440334" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009101461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566406" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566407" version="1" comment="ecryptfs-utils is &lt;61-1.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566408" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566409" version="1" comment="elfutils is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566410" version="1" comment="libasm1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566411" version="1" comment="libdw1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566412" version="1" comment="libdw1-32bit is &lt;0.152-4.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566413" version="1" comment="libebl1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566414" version="1" comment="libebl1-32bit is &lt;0.152-4.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566415" version="1" comment="libelf1 is &lt;0.152-4.9.17 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563274" version="1" comment="libelf1-32bit is &lt;0.152-4.9.17 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566416" version="1" comment="emacs is &lt;22.3-4.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566417" version="1" comment="emacs-info is &lt;22.3-4.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566418" version="1" comment="emacs-x11 is &lt;22.3-4.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566419" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566420" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566421" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566422" version="1" comment="file is &lt;4.24-43.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566423" version="1" comment="file-32bit is &lt;4.24-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566424" version="1" comment="finch is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566425" version="1" comment="libpurple is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566426" version="1" comment="libpurple-lang is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566427" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566428" version="1" comment="libpurple-tcl is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566429" version="1" comment="pidgin is &lt;2.6.6-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566430" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566431" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566432" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566433" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566434" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.41 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566435" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566436" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566437" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566438" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566439" version="1" comment="libfreebl3 is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566440" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566441" version="1" comment="libsoftokn3 is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566442" version="1" comment="libsoftokn3-32bit is &lt;3.15.4-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566443" version="1" comment="mozilla-nss is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566444" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566445" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566446" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566447" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.23 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566448" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566449" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566450" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566451" version="1" comment="libfreebl3 is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566452" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566453" version="1" comment="libsoftokn3 is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566454" version="1" comment="libsoftokn3-32bit is &lt;3.16.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566455" version="1" comment="mozilla-nss is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566456" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566457" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566458" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566459" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566460" version="1" comment="libfreebl3 is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566461" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566462" version="1" comment="libsoftokn3 is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566463" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566464" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566465" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566466" version="1" comment="mozilla-nss is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566467" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566468" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566469" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566470" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566471" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.8.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566472" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.8.7 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566473" version="1" comment="libfreebl3 is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566474" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.8.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566475" version="1" comment="libsoftokn3 is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566476" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-0.8.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566477" version="1" comment="mozilla-nss is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566478" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.8.11 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566479" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.8.11 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566480" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566481" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566482" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566483" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566484" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566485" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566486" version="1" comment="MozillaFirefox is &lt;38.3.0esr-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566487" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566488" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566489" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.31 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566490" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566491" version="1" comment="libfreebl3 is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566492" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566493" version="1" comment="libsoftokn3 is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566494" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566495" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566496" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566497" version="1" comment="mozilla-nss is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566498" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566499" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566500" version="1" comment="MozillaFirefox is &lt;24.2.0esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566501" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566502" version="1" comment="MozillaFirefox-translations is &lt;24.2.0esr-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566503" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566504" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566505" version="1" comment="libsoftokn3 is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566506" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566507" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566508" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566509" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566510" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566511" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566512" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566513" version="1" comment="libfreebl3 is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566514" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566515" version="1" comment="libsoftokn3 is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566516" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566517" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566518" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566519" version="1" comment="mozilla-nss is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566520" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566521" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566522" version="1" comment="MozillaFirefox is &lt;38.2.1esr-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566523" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.12.51 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566524" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566525" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566526" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566527" version="1" comment="libsoftokn3 is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566528" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566529" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566530" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566531" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566532" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566533" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566534" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566535" version="1" comment="flash-player is &lt;11.2.202.418-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566536" version="1" comment="flash-player-gnome is &lt;11.2.202.418-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566537" version="1" comment="flash-player-kde4 is &lt;11.2.202.418-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566538" version="1" comment="flash-player is &lt;11.2.202.481-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566539" version="1" comment="flash-player-gnome is &lt;11.2.202.481-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566540" version="1" comment="flash-player-kde4 is &lt;11.2.202.481-0.8.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566541" version="1" comment="flash-player is &lt;11.2.202.491-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566542" version="1" comment="flash-player-gnome is &lt;11.2.202.491-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566543" version="1" comment="flash-player-kde4 is &lt;11.2.202.491-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566544" version="1" comment="flash-player is &lt;11.2.202.508-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566545" version="1" comment="flash-player-gnome is &lt;11.2.202.508-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566546" version="1" comment="flash-player-kde4 is &lt;11.2.202.508-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566547" version="1" comment="flash-player is &lt;11.2.202.521-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566548" version="1" comment="flash-player-gnome is &lt;11.2.202.521-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566549" version="1" comment="flash-player-kde4 is &lt;11.2.202.521-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566550" version="1" comment="flash-player is &lt;11.2.202.535-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566551" version="1" comment="flash-player-gnome is &lt;11.2.202.535-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566552" version="1" comment="flash-player-kde4 is &lt;11.2.202.535-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566553" version="1" comment="flash-player is &lt;11.2.202.540-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566554" version="1" comment="flash-player-gnome is &lt;11.2.202.540-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566555" version="1" comment="flash-player-kde4 is &lt;11.2.202.540-0.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566556" version="1" comment="flash-player is &lt;11.2.202.548-0.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566557" version="1" comment="flash-player-gnome is &lt;11.2.202.548-0.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566558" version="1" comment="flash-player-kde4 is &lt;11.2.202.548-0.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566559" version="1" comment="flash-player is &lt;11.2.202.554-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566560" version="1" comment="flash-player-gnome is &lt;11.2.202.554-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566561" version="1" comment="flash-player-kde4 is &lt;11.2.202.554-0.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566562" version="1" comment="flash-player is &lt;11.2.202.559-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566563" version="1" comment="flash-player-gnome is &lt;11.2.202.559-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566564" version="1" comment="flash-player-kde4 is &lt;11.2.202.559-0.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566565" version="1" comment="foomatic-filters is &lt;3.0.2-269.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566566" version="1" comment="freetype2 is &lt;2.3.7-25.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566567" version="1" comment="freetype2-32bit is &lt;2.3.7-25.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566568" version="1" comment="ft2demos is &lt;2.3.7-25.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566569" version="1" comment="fuse is &lt;2.8.7-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566570" version="1" comment="libfuse2 is &lt;2.8.7-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566571" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566572" version="1" comment="giflib is &lt;4.1.6-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566573" version="1" comment="giflib-32bit is &lt;4.1.6-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566574" version="1" comment="gimp is &lt;2.6.2-3.34.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566575" version="1" comment="gimp-lang is &lt;2.6.2-3.34.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566576" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.45.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566577" version="1" comment="glibc is &lt;2.11.3-17.72.14 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566578" version="1" comment="glibc-32bit is &lt;2.11.3-17.72.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566579" version="1" comment="glibc-devel is &lt;2.11.3-17.72.14 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566580" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.72.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566581" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566582" version="1" comment="glibc-locale is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566583" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.72.14 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566584" version="1" comment="nscd is &lt;2.11.3-17.72.14 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566585" version="1" comment="glibc is &lt;2.11.3-17.87.3 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566586" version="1" comment="glibc-32bit is &lt;2.11.3-17.87.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566587" version="1" comment="glibc-devel is &lt;2.11.3-17.87.3 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566588" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.87.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566589" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566590" version="1" comment="glibc-locale is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566591" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.87.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566592" version="1" comment="nscd is &lt;2.11.3-17.87.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566593" version="1" comment="glibc is &lt;2.11.3-17.95.2 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566594" version="1" comment="glibc-32bit is &lt;2.11.3-17.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566595" version="1" comment="glibc-devel is &lt;2.11.3-17.95.2 for i586,i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566596" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566597" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566598" version="1" comment="glibc-locale is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566599" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566600" version="1" comment="nscd is &lt;2.11.3-17.95.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566601" version="1" comment="gnutls is &lt;2.4.1-24.39.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566602" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.51.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566603" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566604" version="1" comment="gnutls is &lt;2.4.1-24.39.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566605" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.57.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566606" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566607" version="1" comment="gnutls is &lt;2.4.1-24.39.60.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566608" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.60.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566609" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566610" version="1" comment="gpg2 is &lt;2.0.9-25.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566611" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566612" version="1" comment="gpg2 is &lt;2.0.9-25.33.41.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566613" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.41.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566614" version="1" comment="gpgme is &lt;1.1.6-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566615" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566616" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.49.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566617" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.49.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566618" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566619" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566620" version="1" comment="libgstbasecamerabinsrc-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566621" version="1" comment="libgstbasecamerabinsrc-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566622" version="1" comment="libgstbasevideo-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566623" version="1" comment="libgstbasevideo-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566624" version="1" comment="libgstphotography-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566625" version="1" comment="libgstphotography-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566626" version="1" comment="libgstsignalprocessor-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566627" version="1" comment="libgstsignalprocessor-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566628" version="1" comment="libgstvdp-0_10-0 is &lt;0.10.22-7.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566629" version="1" comment="libgstvdp-0_10-0-32bit is &lt;0.10.22-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566630" version="1" comment="gtk2 is &lt;2.18.9-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566631" version="1" comment="gtk2-32bit is &lt;2.18.9-0.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566632" version="1" comment="gtk2-lang is &lt;2.18.9-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566633" version="1" comment="gtk2 is &lt;2.18.9-0.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566634" version="1" comment="gtk2-32bit is &lt;2.18.9-0.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566635" version="1" comment="gtk2-lang is &lt;2.18.9-0.39.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566636" version="1" comment="icedtea-web is &lt;1.4.2-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563371" version="1" comment="icu is &lt;4.0-7.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566637" version="1" comment="libicu is &lt;4.0-7.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566638" version="1" comment="libjasper is &lt;1.900.1-134.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566639" version="1" comment="libjasper-32bit is &lt;1.900.1-134.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566640" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566641" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.71-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566642" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.71-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566643" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-0.11.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566644" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.85-0.11.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566645" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.85-0.11.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566646" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-0.14.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566647" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-0.14.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566648" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-0.14.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566649" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-0.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566650" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-0.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566651" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-0.17.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566652" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566653" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566654" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566655" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566656" version="1" comment="kdm is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566657" version="1" comment="kwin is &lt;4.3.5-0.12.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566658" version="1" comment="kde4-l10n-ar is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566659" version="1" comment="kde4-l10n-cs is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566660" version="1" comment="kde4-l10n-da is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566661" version="1" comment="kde4-l10n-da-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566662" version="1" comment="kde4-l10n-da-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566663" version="1" comment="kde4-l10n-de is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563389" version="1" comment="kde4-l10n-de-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563390" version="1" comment="kde4-l10n-de-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566664" version="1" comment="kde4-l10n-en_GB is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566665" version="1" comment="kde4-l10n-es is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566666" version="1" comment="kde4-l10n-es-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566667" version="1" comment="kde4-l10n-es-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566668" version="1" comment="kde4-l10n-fr is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566669" version="1" comment="kde4-l10n-fr-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566670" version="1" comment="kde4-l10n-fr-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566671" version="1" comment="kde4-l10n-hu is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566672" version="1" comment="kde4-l10n-it is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566673" version="1" comment="kde4-l10n-it-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566674" version="1" comment="kde4-l10n-it-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566675" version="1" comment="kde4-l10n-ja is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566676" version="1" comment="kde4-l10n-ko is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566677" version="1" comment="kde4-l10n-nb is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566678" version="1" comment="kde4-l10n-nl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566679" version="1" comment="kde4-l10n-nl-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566680" version="1" comment="kde4-l10n-nl-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566681" version="1" comment="kde4-l10n-pl is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566682" version="1" comment="kde4-l10n-pl-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566683" version="1" comment="kde4-l10n-pl-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566684" version="1" comment="kde4-l10n-pt is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566685" version="1" comment="kde4-l10n-pt_BR is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566686" version="1" comment="kde4-l10n-pt_BR-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566687" version="1" comment="kde4-l10n-pt_BR-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566688" version="1" comment="kde4-l10n-ru is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566689" version="1" comment="kde4-l10n-ru-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566690" version="1" comment="kde4-l10n-ru-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566691" version="1" comment="kde4-l10n-sv is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566692" version="1" comment="kde4-l10n-sv-data is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566693" version="1" comment="kde4-l10n-sv-doc is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566694" version="1" comment="kde4-l10n-zh_CN is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566695" version="1" comment="kde4-l10n-zh_TW is &lt;4.3.5-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566696" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566697" version="1" comment="kdebase4-runtime-xine is &lt;4.3.5-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566698" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566699" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566700" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566701" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566702" version="1" comment="kdm is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566703" version="1" comment="kwin is &lt;4.3.5-0.12.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566704" version="1" comment="kdelibs4 is &lt;4.3.5-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566705" version="1" comment="kdelibs4-core is &lt;4.3.5-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566706" version="1" comment="libkde4 is &lt;4.3.5-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563393" version="1" comment="libkde4-32bit is &lt;4.3.5-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566707" version="1" comment="libkdecore4 is &lt;4.3.5-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563395" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566708" version="1" comment="kdirstat is &lt;2.4.4-255.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566709" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566710" version="1" comment="kernel-default is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566711" version="1" comment="kernel-default-base is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566712" version="1" comment="kernel-default-devel is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566713" version="1" comment="kernel-default-extra is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566714" version="1" comment="kernel-pae is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566715" version="1" comment="kernel-pae-base is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566716" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566717" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.40.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566718" version="1" comment="kernel-source is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566719" version="1" comment="kernel-syms is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566720" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566721" version="1" comment="kernel-xen is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566722" version="1" comment="kernel-xen-base is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566723" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566724" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.40.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566725" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.7.3 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566726" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.7.3 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566727" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.67.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566728" version="1" comment="kernel-default is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566729" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566730" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566731" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566732" version="1" comment="kernel-pae is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566733" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566734" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566735" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.67.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566736" version="1" comment="kernel-source is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566737" version="1" comment="kernel-syms is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566738" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566739" version="1" comment="kernel-xen is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566740" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566741" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566742" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.67.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566743" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.40.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566744" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.71.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566745" version="1" comment="kernel-default is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566746" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566747" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566748" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566749" version="1" comment="kernel-pae is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566750" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566751" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566752" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566753" version="1" comment="kernel-source is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566754" version="1" comment="kernel-syms is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566755" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566756" version="1" comment="kernel-xen is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566757" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566758" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566759" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566760" version="1" comment="krb5 is &lt;1.6.3-133.49.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566761" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566762" version="1" comment="krb5-client is &lt;1.6.3-133.49.62.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566763" version="1" comment="krb5 is &lt;1.6.3-133.49.97.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566764" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566765" version="1" comment="krb5-client is &lt;1.6.3-133.49.97.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566766" version="1" comment="krb5 is &lt;1.6.3-133.49.103.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566767" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.103.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566768" version="1" comment="krb5-client is &lt;1.6.3-133.49.103.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566769" version="1" comment="krb5 is &lt;1.6.3-133.49.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566770" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566771" version="1" comment="krb5-client is &lt;1.6.3-133.49.64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566772" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566773" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566774" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566775" version="1" comment="krb5 is &lt;1.6.3-133.49.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566776" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566777" version="1" comment="krb5-client is &lt;1.6.3-133.49.68.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566778" version="1" comment="kvm is &lt;1.4.2-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566779" version="1" comment="kvm is &lt;1.4.2-0.22.34.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566780" version="1" comment="kvm is &lt;1.4.2-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566781" version="1" comment="kvm is &lt;1.4.2-0.21.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566782" version="1" comment="libvirt is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566783" version="1" comment="libvirt-client is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566784" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.19.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566785" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566786" version="1" comment="libvirt-python is &lt;1.0.5.9-0.19.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566787" version="1" comment="lcms2 is &lt;2.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566788" version="1" comment="liblcms2-2 is &lt;2.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566789" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566790" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566791" version="1" comment="libqt4 is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566792" version="1" comment="libqt4-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566793" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566794" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566795" version="1" comment="libqt4-sql is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566796" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566797" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566798" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566799" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566800" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566801" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566802" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566803" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566804" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566805" version="1" comment="libqt4-x11 is &lt;4.6.3-5.29.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566806" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.29.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566807" version="1" comment="libecpg6 is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566808" version="1" comment="libpq5 is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566809" version="1" comment="libpq5-32bit is &lt;9.1.12-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566810" version="1" comment="postgresql91 is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566811" version="1" comment="postgresql91-docs is &lt;9.1.12-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566812" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566813" version="1" comment="libfreebl3 is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566814" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566815" version="1" comment="libsoftokn3 is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566816" version="1" comment="libsoftokn3-32bit is &lt;3.16.5-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566817" version="1" comment="mozilla-nss is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566818" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566819" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566820" version="1" comment="libgadu is &lt;1.8.2-1.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566821" version="1" comment="libgcrypt11 is &lt;1.5.0-0.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566822" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566823" version="1" comment="libgcrypt11 is &lt;1.5.0-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566824" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566825" version="1" comment="libjasper is &lt;1.900.1-134.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566826" version="1" comment="libjasper-32bit is &lt;1.900.1-134.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566827" version="1" comment="libksba is &lt;1.0.4-1.18.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566828" version="1" comment="libksba is &lt;1.0.4-1.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566829" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566830" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566831" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566832" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566833" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566834" version="1" comment="libmysql55client18 is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566835" version="1" comment="libmysql55client18-32bit is &lt;5.5.39-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566836" version="1" comment="libmysql55client_r18 is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566837" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.39-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566838" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566839" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566840" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.13 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566841" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.13 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566842" version="1" comment="mysql is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566843" version="1" comment="mysql-client is &lt;5.5.39-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566844" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566845" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566846" version="1" comment="openssl is &lt;0.9.8j-0.66.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566847" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566848" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566849" version="1" comment="libpng12-0 is &lt;1.2.31-5.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566850" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566851" version="1" comment="libpng12-0 is &lt;1.2.31-5.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566852" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566853" version="1" comment="libpng12-0 is &lt;1.2.31-5.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566854" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566855" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566856" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566857" version="1" comment="libpoppler5 is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563470" version="1" comment="poppler-tools is &lt;0.12.3-1.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566858" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566859" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566860" version="1" comment="libpulse0 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566861" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566862" version="1" comment="pulseaudio is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566863" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566864" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566865" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566866" version="1" comment="pulseaudio-module-bluetooth is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566867" version="1" comment="pulseaudio-module-gconf is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566868" version="1" comment="pulseaudio-module-jack is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566869" version="1" comment="pulseaudio-module-lirc is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566870" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566871" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566872" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566873" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566874" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566875" version="1" comment="libqt4 is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566876" version="1" comment="libqt4-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566877" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566878" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566879" version="1" comment="libqt4-sql is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566880" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566881" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566882" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566883" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566884" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566885" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566886" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566887" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566888" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566889" version="1" comment="libqt4-x11 is &lt;4.6.3-5.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566890" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566891" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566892" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566893" version="1" comment="libqt4 is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566894" version="1" comment="libqt4-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566895" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566896" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566897" version="1" comment="libqt4-sql is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566898" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566899" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566900" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566901" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566902" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566903" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566904" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566905" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566906" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566907" version="1" comment="libqt4-x11 is &lt;4.6.3-5.34.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566908" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563504" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563505" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563506" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563507" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563509" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563510" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563511" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563512" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563513" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563514" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563515" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563516" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563517" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563518" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563519" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563520" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563521" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563522" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563523" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563524" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563525" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563526" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563527" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563528" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563529" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563530" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563531" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563532" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563533" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563534" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563535" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563536" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563537" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563538" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563539" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563540" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563541" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563542" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563543" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563544" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563545" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563546" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563548" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563549" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563550" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563551" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563552" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563553" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563554" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563555" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563556" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563557" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563558" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563559" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563560" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563561" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563563" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563564" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563565" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563566" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563567" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563568" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563569" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563570" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563571" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563572" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563573" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563574" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563575" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563576" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563578" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563579" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563580" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563581" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563582" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563583" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563585" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563586" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563587" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563588" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563589" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563590" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563591" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563592" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563593" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563594" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563595" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563596" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563597" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563598" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563599" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563600" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563601" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563602" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563603" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563604" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563605" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563606" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563607" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563608" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563609" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563610" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563611" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563612" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563613" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563614" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563615" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563616" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563617" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563618" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563619" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563620" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563621" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563622" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563624" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563625" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563626" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563627" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563628" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563629" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563630" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563631" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563632" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563633" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563634" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563635" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563636" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563637" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563639" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563640" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563641" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563642" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563643" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563644" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563645" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563646" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563647" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563648" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563649" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563650" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563651" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563652" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563654" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563655" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.6.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566909" version="1" comment="librsvg is &lt;2.26.0-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566910" version="1" comment="librsvg-32bit is &lt;2.26.0-2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566911" version="1" comment="rsvg-view is &lt;2.26.0-2.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566912" version="1" comment="libsndfile is &lt;1.0.20-2.6.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566913" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.6.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566914" version="1" comment="libsndfile is &lt;1.0.20-2.10.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566915" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566916" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563659" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566917" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566918" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566919" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566920" version="1" comment="libssh2 is &lt;0.2-5.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563663" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.4.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566921" version="1" comment="libtasn1 is &lt;1.5-1.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566922" version="1" comment="libtasn1-3 is &lt;1.5-1.28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566923" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566924" version="1" comment="libvdpau1 is &lt;0.4.1-16.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566925" version="1" comment="libvdpau1-32bit is &lt;0.4.1-16.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566926" version="1" comment="libvirt is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566927" version="1" comment="libvirt-client is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566928" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566929" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566930" version="1" comment="libvirt-python is &lt;1.0.5.9-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566931" version="1" comment="LibVNCServer is &lt;0.9.1-156.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566932" version="1" comment="libwmf is &lt;0.2.8.4-206.29.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566933" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566934" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566935" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566936" version="1" comment="libxml2 is &lt;2.7.6-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566937" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566938" version="1" comment="libxml2-python is &lt;2.7.6-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566939" version="1" comment="libxml2 is &lt;2.7.6-0.34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566940" version="1" comment="libxml2-32bit is &lt;2.7.6-0.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566941" version="1" comment="libxml2-python is &lt;2.7.6-0.34.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566942" version="1" comment="libxml2 is &lt;2.7.6-0.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566943" version="1" comment="libxml2-32bit is &lt;2.7.6-0.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566944" version="1" comment="libxml2-python is &lt;2.7.6-0.37.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563694" version="1" comment="lxc is &lt;0.8.0-0.21.6 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563696" version="1" comment="lxc is &lt;0.8.0-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566945" version="1" comment="MozillaFirefox is &lt;38.6.0esr-31.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566946" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-18.24 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566947" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-31.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566948" version="1" comment="libfreebl3 is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566949" version="1" comment="libfreebl3-32bit is &lt;3.20.2-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566950" version="1" comment="libsoftokn3 is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566951" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566952" version="1" comment="mozilla-nss is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566953" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566954" version="1" comment="mozilla-nss-tools is &lt;3.20.2-25.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566955" version="1" comment="mozilla-nspr is &lt;4.10.8-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566956" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566957" version="1" comment="libfreebl3 is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566958" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566959" version="1" comment="libsoftokn3 is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566960" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566961" version="1" comment="mozilla-nss is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566962" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566963" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566964" version="1" comment="libfreebl3 is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566965" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566966" version="1" comment="libsoftokn3 is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566967" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566968" version="1" comment="mozilla-nss is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566969" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566970" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566971" version="1" comment="mutt is &lt;1.5.17-42.37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566972" version="1" comment="libmysql55client18 is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566973" version="1" comment="libmysql55client18-32bit is &lt;5.5.45-0.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566974" version="1" comment="libmysql55client_r18 is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566975" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.45-0.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566976" version="1" comment="mysql is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566977" version="1" comment="mysql-client is &lt;5.5.45-0.11.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566978" version="1" comment="libmysql55client18 is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566979" version="1" comment="libmysql55client18-32bit is &lt;5.5.46-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566980" version="1" comment="libmysql55client_r18 is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566981" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.46-0.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566982" version="1" comment="mysql is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566983" version="1" comment="mysql-client is &lt;5.5.46-0.14.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566984" version="1" comment="libmysql55client18 is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566985" version="1" comment="libmysql55client18-32bit is &lt;5.5.47-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566986" version="1" comment="libmysql55client_r18 is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566987" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.47-0.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566988" version="1" comment="mysql is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566989" version="1" comment="mysql-client is &lt;5.5.47-0.17.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566990" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563731" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566991" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566992" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566993" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566994" version="1" comment="novell-qtgui is &lt;3.0.0-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566995" version="1" comment="novell-qtgui-cli is &lt;3.0.0-0.20.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566996" version="1" comment="novell-ui-base is &lt;3.0.0-0.10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566997" version="1" comment="libfreebl3 is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566998" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009566999" version="1" comment="libsoftokn3 is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567000" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567001" version="1" comment="mozilla-nss is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567002" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567003" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567004" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567005" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567006" version="1" comment="openldap2-client is &lt;2.4.26-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567007" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567008" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567009" version="1" comment="openldap2-client is &lt;2.4.26-0.30.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567010" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.62.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567011" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.62.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567012" version="1" comment="openldap2-client is &lt;2.4.26-0.62.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567013" version="1" comment="openslp is &lt;1.2.0-172.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567014" version="1" comment="openslp-32bit is &lt;1.2.0-172.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567015" version="1" comment="openssh is &lt;6.2p2-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567016" version="1" comment="openssh-askpass is &lt;6.2p2-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567017" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567018" version="1" comment="openssh is &lt;6.2p2-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567019" version="1" comment="openssh-askpass is &lt;6.2p2-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567020" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.21.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567021" version="1" comment="openssh is &lt;6.2p2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567022" version="1" comment="openssh-askpass is &lt;6.2p2-0.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567023" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.24.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567024" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567025" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567026" version="1" comment="openssl is &lt;0.9.8j-0.80.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567027" version="1" comment="openssl-certs is &lt;1.97-0.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567028" version="1" comment="openvpn is &lt;2.0.9-143.40.5 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567029" version="1" comment="orca is &lt;2.28.3-0.5.10 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567030" version="1" comment="orca-lang is &lt;2.28.3-0.5.10 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567031" version="1" comment="pam is &lt;1.1.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567032" version="1" comment="pam-32bit is &lt;1.1.5-0.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567033" version="1" comment="pam-doc is &lt;1.1.5-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567034" version="1" comment="perl is &lt;5.10.0-64.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567035" version="1" comment="perl-32bit is &lt;5.10.0-64.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567036" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567037" version="1" comment="perl-Test-Simple is &lt;0.72-0.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567038" version="1" comment="perl-base is &lt;5.10.0-64.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567039" version="1" comment="perl-doc is &lt;5.10.0-64.70.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567040" version="1" comment="popt is &lt;1.7-37.60.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567041" version="1" comment="popt-32bit is &lt;1.7-37.60.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567042" version="1" comment="rpm is &lt;4.4.2.3-37.60.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567043" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.60.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567044" version="1" comment="libecpg6 is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567045" version="1" comment="libpq5 is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567046" version="1" comment="libpq5-32bit is &lt;9.4.5-0.8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567047" version="1" comment="postgresql94 is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567048" version="1" comment="postgresql94-docs is &lt;9.4.5-0.8.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567049" version="1" comment="libecpg6 is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567050" version="1" comment="libpq5 is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567051" version="1" comment="libpq5-32bit is &lt;9.1.15-0.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567052" version="1" comment="postgresql91 is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567053" version="1" comment="postgresql91-docs is &lt;9.1.15-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567054" version="1" comment="postgresql91 is &lt;9.1.18-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567055" version="1" comment="postgresql91-docs is &lt;9.1.18-0.3.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567056" version="1" comment="postgresql91 is &lt;9.1.19-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567057" version="1" comment="postgresql91-docs is &lt;9.1.19-0.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567058" version="1" comment="ppp is &lt;2.4.5.git-2.29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567059" version="1" comment="procmail is &lt;3.22-240.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567060" version="1" comment="puppet is &lt;2.6.18-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567061" version="1" comment="pwlib is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567062" version="1" comment="pwlib-plugins-avc is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567063" version="1" comment="pwlib-plugins-dc is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567064" version="1" comment="pwlib-plugins-v4l2 is &lt;1.10.10-120.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567065" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567066" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567067" version="1" comment="python is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567068" version="1" comment="python-base is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567069" version="1" comment="python-base-32bit is &lt;2.6.9-0.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567070" version="1" comment="python-curses is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567071" version="1" comment="python-devel is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563788" version="1" comment="python-tk is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567072" version="1" comment="python-xml is &lt;2.6.9-0.33.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567073" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567074" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567075" version="1" comment="python is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567076" version="1" comment="python-base is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567077" version="1" comment="python-base-32bit is &lt;2.6.9-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567078" version="1" comment="python-curses is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567079" version="1" comment="python-devel is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563796" version="1" comment="python-tk is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567080" version="1" comment="python-xml is &lt;2.6.9-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567081" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567082" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567083" version="1" comment="python is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567084" version="1" comment="python-base is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567085" version="1" comment="python-base-32bit is &lt;2.6.9-0.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567086" version="1" comment="python-curses is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567087" version="1" comment="python-devel is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563804" version="1" comment="python-tk is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567088" version="1" comment="python-xml is &lt;2.6.9-0.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567089" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567090" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567091" version="1" comment="python is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567092" version="1" comment="python-base is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567093" version="1" comment="python-base-32bit is &lt;2.6.9-0.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567094" version="1" comment="python-curses is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567095" version="1" comment="python-devel is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563812" version="1" comment="python-tk is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567096" version="1" comment="python-xml is &lt;2.6.9-0.31.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567097" version="1" comment="python-lxml is &lt;2.3.6-0.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567098" version="1" comment="python-setuptools is &lt;0.6c8-10.19.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567099" version="1" comment="python-setuptools is &lt;0.6c11-6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567100" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567101" version="1" comment="rsync is &lt;3.0.4-2.49.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567102" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567103" version="1" comment="rxvt-unicode is &lt;9.05-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567104" version="1" comment="libldb1 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567105" version="1" comment="libldb1-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567106" version="1" comment="libsmbclient0 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567107" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567108" version="1" comment="libtalloc2 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567109" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567110" version="1" comment="libtdb1 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567111" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567112" version="1" comment="libtevent0 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567113" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567114" version="1" comment="libwbclient0 is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567115" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567116" version="1" comment="samba is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567117" version="1" comment="samba-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567118" version="1" comment="samba-client is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567119" version="1" comment="samba-client-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567120" version="1" comment="samba-doc is &lt;3.6.3-0.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567121" version="1" comment="samba-krb-printing is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567122" version="1" comment="samba-winbind is &lt;3.6.3-0.56.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567123" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567124" version="1" comment="libldb1 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567125" version="1" comment="libldb1-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567126" version="1" comment="libsmbclient0 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567127" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567128" version="1" comment="libtalloc2 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567129" version="1" comment="libtalloc2-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567130" version="1" comment="libtdb1 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567131" version="1" comment="libtdb1-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567132" version="1" comment="libtevent0 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567133" version="1" comment="libtevent0-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567134" version="1" comment="libwbclient0 is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567135" version="1" comment="libwbclient0-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567136" version="1" comment="samba is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567137" version="1" comment="samba-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567138" version="1" comment="samba-client is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567139" version="1" comment="samba-client-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567140" version="1" comment="samba-doc is &lt;3.6.3-64.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567141" version="1" comment="samba-krb-printing is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567142" version="1" comment="samba-winbind is &lt;3.6.3-64.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567143" version="1" comment="samba-winbind-32bit is &lt;3.6.3-64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567144" version="1" comment="sblim-sfcb is &lt;1.3.11-0.25.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567145" version="1" comment="shim is &lt;0.7.318.81ee561d-0.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567146" version="1" comment="strongswan is &lt;4.4.0-6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567147" version="1" comment="strongswan-doc is &lt;4.4.0-6.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567148" version="1" comment="strongswan is &lt;4.4.0-6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567149" version="1" comment="strongswan-doc is &lt;4.4.0-6.32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567150" version="1" comment="sudo is &lt;1.7.6p2-0.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567151" version="1" comment="tcpdump is &lt;3.9.8-1.27.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567152" version="1" comment="libtidy is &lt;1.0-37.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567153" version="1" comment="libtiff3 is &lt;3.8.2-141.160.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567154" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.160.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567155" version="1" comment="unzip is &lt;6.00-11.13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567156" version="1" comment="vorbis-tools is &lt;1.1.1-174.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567157" version="1" comment="wget is &lt;1.11.4-1.19.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563891" version="1" comment="wireshark is &lt;1.10.11-0.2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563893" version="1" comment="wireshark is &lt;1.12.7-0.5.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009563895" version="1" comment="wireshark is &lt;1.12.9-0.12.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567158" version="1" comment="wpa_supplicant is &lt;0.7.1-6.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567159" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567160" version="1" comment="wpa_supplicant is &lt;0.7.1-6.17.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567161" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.17.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567162" version="1" comment="xalan-j2 is &lt;2.7.0-217.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567163" version="1" comment="xen is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567164" version="1" comment="xen-doc-html is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567165" version="1" comment="xen-doc-pdf is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567166" version="1" comment="xen-kmp-default is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567167" version="1" comment="xen-kmp-pae is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567168" version="1" comment="xen-libs is &lt;4.2.5_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567169" version="1" comment="xen-libs-32bit is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567170" version="1" comment="xen-tools is &lt;4.2.5_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567171" version="1" comment="xen-tools-domU is &lt;4.2.5_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567172" version="1" comment="xen is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567173" version="1" comment="xen-doc-html is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567174" version="1" comment="xen-doc-pdf is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567175" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.40-0.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567176" version="1" comment="xen-libs is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567177" version="1" comment="xen-libs-32bit is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567178" version="1" comment="xen-tools is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567179" version="1" comment="xen-tools-domU is &lt;4.2.5_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567180" version="1" comment="xen is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567181" version="1" comment="xen-doc-html is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567182" version="1" comment="xen-doc-pdf is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567183" version="1" comment="xen-kmp-default is &lt;4.2.5_12_3.0.101_0.47.55-15.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567184" version="1" comment="xen-kmp-pae is &lt;4.2.5_12_3.0.101_0.47.55-15.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567185" version="1" comment="xen-libs is &lt;4.2.5_12-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567186" version="1" comment="xen-libs-32bit is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567187" version="1" comment="xen-tools is &lt;4.2.5_12-15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567188" version="1" comment="xen-tools-domU is &lt;4.2.5_12-15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567189" version="1" comment="xen is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567190" version="1" comment="xen-doc-html is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567191" version="1" comment="xen-doc-pdf is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567192" version="1" comment="xen-kmp-default is &lt;4.2.5_14_3.0.101_0.47.67-18.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567193" version="1" comment="xen-kmp-pae is &lt;4.2.5_14_3.0.101_0.47.67-18.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567194" version="1" comment="xen-libs is &lt;4.2.5_14-18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567195" version="1" comment="xen-libs-32bit is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567196" version="1" comment="xen-tools is &lt;4.2.5_14-18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567197" version="1" comment="xen-tools-domU is &lt;4.2.5_14-18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567198" version="1" comment="xen is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567199" version="1" comment="xen-doc-html is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567200" version="1" comment="xen-doc-pdf is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567201" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.82_0.7-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567202" version="1" comment="xen-kmp-pae is &lt;4.2.2_06_3.0.82_0.7-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567203" version="1" comment="xen-libs is &lt;4.2.2_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567204" version="1" comment="xen-libs-32bit is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567205" version="1" comment="xen-tools is &lt;4.2.2_06-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567206" version="1" comment="xen-tools-domU is &lt;4.2.2_06-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567207" version="1" comment="xen is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567208" version="1" comment="xen-doc-html is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567209" version="1" comment="xen-doc-pdf is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567210" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.93_0.8-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567211" version="1" comment="xen-kmp-pae is &lt;4.2.3_02_3.0.93_0.8-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567212" version="1" comment="xen-libs is &lt;4.2.3_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567213" version="1" comment="xen-libs-32bit is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567214" version="1" comment="xen-tools is &lt;4.2.3_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567215" version="1" comment="xen-tools-domU is &lt;4.2.3_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567216" version="1" comment="xen is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567217" version="1" comment="xen-doc-html is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567218" version="1" comment="xen-doc-pdf is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567219" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.8-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567220" version="1" comment="xen-kmp-pae is &lt;4.2.3_08_3.0.101_0.8-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567221" version="1" comment="xen-libs is &lt;4.2.3_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567222" version="1" comment="xen-libs-32bit is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567223" version="1" comment="xen-tools is &lt;4.2.3_08-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567224" version="1" comment="xen-tools-domU is &lt;4.2.3_08-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567225" version="1" comment="xen is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567226" version="1" comment="xen-doc-html is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567227" version="1" comment="xen-doc-pdf is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567228" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.15-0.7.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567229" version="1" comment="xen-kmp-pae is &lt;4.2.4_02_3.0.101_0.15-0.7.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567230" version="1" comment="xen-libs is &lt;4.2.4_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567231" version="1" comment="xen-libs-32bit is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567232" version="1" comment="xen-tools is &lt;4.2.4_02-0.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567233" version="1" comment="xen-tools-domU is &lt;4.2.4_02-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567234" version="1" comment="xen is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567235" version="1" comment="xen-doc-html is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567236" version="1" comment="xen-doc-pdf is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567237" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567238" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567239" version="1" comment="xen-libs is &lt;4.2.4_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567240" version="1" comment="xen-libs-32bit is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567241" version="1" comment="xen-tools is &lt;4.2.4_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567242" version="1" comment="xen-tools-domU is &lt;4.2.4_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567243" version="1" comment="xen is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567244" version="1" comment="xen-doc-html is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567245" version="1" comment="xen-doc-pdf is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567246" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567247" version="1" comment="xen-kmp-pae is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567248" version="1" comment="xen-libs is &lt;4.2.5_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567249" version="1" comment="xen-libs-32bit is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567250" version="1" comment="xen-tools is &lt;4.2.5_04-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567251" version="1" comment="xen-tools-domU is &lt;4.2.5_04-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567252" version="1" comment="xen is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567253" version="1" comment="xen-doc-html is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567254" version="1" comment="xen-doc-pdf is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567255" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567256" version="1" comment="xen-kmp-pae is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567257" version="1" comment="xen-libs is &lt;4.2.5_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567258" version="1" comment="xen-libs-32bit is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567259" version="1" comment="xen-tools is &lt;4.2.5_08-0.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567260" version="1" comment="xen-tools-domU is &lt;4.2.5_08-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567261" version="1" comment="xen is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567262" version="1" comment="xen-doc-html is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567263" version="1" comment="xen-doc-pdf is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567264" version="1" comment="xen-kmp-default is &lt;4.2.5_18_3.0.101_0.47.71-21.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567265" version="1" comment="xen-kmp-pae is &lt;4.2.5_18_3.0.101_0.47.71-21.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567266" version="1" comment="xen-libs is &lt;4.2.5_18-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567267" version="1" comment="xen-libs-32bit is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567268" version="1" comment="xen-tools is &lt;4.2.5_18-21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567269" version="1" comment="xen-tools-domU is &lt;4.2.5_18-21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567270" version="1" comment="xfsprogs is &lt;3.1.8-0.7.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567271" version="1" comment="xinetd is &lt;2.3.14-130.133.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567272" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567273" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567274" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567275" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567276" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567277" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567278" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567279" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567280" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567281" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567282" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567283" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567284" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567285" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567286" version="1" comment="xscreensaver is &lt;5.07-6.36.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117401" version="1" comment="sled-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567287" version="1" comment="MozillaFirefox is &lt;38.6.1esr-34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567288" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-34.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567289" version="1" comment="MozillaFirefox is &lt;38.7.0esr-37.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567290" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-37.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567291" version="1" comment="libfreebl3 is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567292" version="1" comment="libfreebl3-32bit is &lt;3.20.2-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567293" version="1" comment="libsoftokn3 is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567294" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567295" version="1" comment="mozilla-nspr is &lt;4.12-24.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567296" version="1" comment="mozilla-nspr-32bit is &lt;4.12-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567297" version="1" comment="mozilla-nss is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567298" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567299" version="1" comment="mozilla-nss-tools is &lt;3.20.2-28.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567300" version="1" comment="xen is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567301" version="1" comment="xen-doc-html is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567302" version="1" comment="xen-kmp-default is &lt;4.4.2_12_3.0.101_63-23.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567303" version="1" comment="xen-kmp-pae is &lt;4.4.2_12_3.0.101_63-23.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567304" version="1" comment="xen-libs is &lt;4.4.2_12-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567305" version="1" comment="xen-libs-32bit is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567306" version="1" comment="xen-tools is &lt;4.4.2_12-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567307" version="1" comment="xen-tools-domU is &lt;4.4.2_12-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567308" version="1" comment="bind-libs is &lt;9.9.6P1-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567309" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567310" version="1" comment="bind-utils is &lt;9.9.6P1-0.25.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567311" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.41.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567312" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567313" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.21.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567314" version="1" comment="flash-player is &lt;11.2.202.569-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567315" version="1" comment="flash-player-gnome is &lt;11.2.202.569-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567316" version="1" comment="flash-player-kde4 is &lt;11.2.202.569-0.35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567317" version="1" comment="flash-player is &lt;11.2.202.577-0.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567318" version="1" comment="flash-player-gnome is &lt;11.2.202.577-0.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567319" version="1" comment="flash-player-kde4 is &lt;11.2.202.577-0.38.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567320" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567321" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567322" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567323" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567324" version="1" comment="libgomp1 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567325" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567326" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567327" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567328" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567329" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567330" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-10.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567331" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567332" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567333" version="1" comment="icedtea-web is &lt;1.5.3-0.9.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564553" version="1" comment="icu is &lt;4.0-7.30.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567334" version="1" comment="libicu is &lt;4.0-7.30.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567335" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-0.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567336" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-0.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567337" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-0.20.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567338" version="1" comment="kernel-default is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567339" version="1" comment="kernel-default-base is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567340" version="1" comment="kernel-default-devel is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567341" version="1" comment="kernel-default-extra is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567342" version="1" comment="kernel-pae is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567343" version="1" comment="kernel-pae-base is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567344" version="1" comment="kernel-pae-devel is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567345" version="1" comment="kernel-pae-extra is &lt;3.0.101-65.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567346" version="1" comment="kernel-source is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567347" version="1" comment="kernel-syms is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567348" version="1" comment="kernel-trace-devel is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567349" version="1" comment="kernel-xen is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567350" version="1" comment="kernel-xen-base is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567351" version="1" comment="kernel-xen-devel is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567352" version="1" comment="kernel-xen-extra is &lt;3.0.101-65.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567353" version="1" comment="kernel-default is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567354" version="1" comment="kernel-default-base is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567355" version="1" comment="kernel-default-devel is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567356" version="1" comment="kernel-default-extra is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567357" version="1" comment="kernel-pae is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567358" version="1" comment="kernel-pae-base is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567359" version="1" comment="kernel-pae-devel is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567360" version="1" comment="kernel-pae-extra is &lt;3.0.101-71.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567361" version="1" comment="kernel-source is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567362" version="1" comment="kernel-syms is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567363" version="1" comment="kernel-trace-devel is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567364" version="1" comment="kernel-xen is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567365" version="1" comment="kernel-xen-base is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567366" version="1" comment="kernel-xen-devel is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567367" version="1" comment="kernel-xen-extra is &lt;3.0.101-71.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567368" version="1" comment="kernel-default is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567369" version="1" comment="kernel-default-base is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567370" version="1" comment="kernel-default-devel is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567371" version="1" comment="kernel-default-extra is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567372" version="1" comment="kernel-pae is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567373" version="1" comment="kernel-pae-base is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567374" version="1" comment="kernel-pae-devel is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567375" version="1" comment="kernel-pae-extra is &lt;3.0.101-68.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567376" version="1" comment="kernel-source is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567377" version="1" comment="kernel-syms is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567378" version="1" comment="kernel-trace-devel is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567379" version="1" comment="kernel-xen is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567380" version="1" comment="kernel-xen-base is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567381" version="1" comment="kernel-xen-devel is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567382" version="1" comment="kernel-xen-extra is &lt;3.0.101-68.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567383" version="1" comment="krb5 is &lt;1.6.3-133.49.106.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567384" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567385" version="1" comment="krb5-client is &lt;1.6.3-133.49.106.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567386" version="1" comment="kvm is &lt;1.4.2-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567387" version="1" comment="kvm is &lt;1.4.2-35.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567388" version="1" comment="libotr2 is &lt;3.2.0-10.5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564685" version="1" comment="google-carlito-fonts is &lt;1.1.03.beta1-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564687" version="1" comment="libhyphen0 is &lt;2.8.8-2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564688" version="1" comment="libmythes-1_2-0 is &lt;1.2.4-2.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564689" version="1" comment="libreoffice is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564690" version="1" comment="libreoffice-base is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564691" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564693" version="1" comment="libreoffice-calc is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564694" version="1" comment="libreoffice-calc-extensions is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564695" version="1" comment="libreoffice-draw is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564696" version="1" comment="libreoffice-filters-optional is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564697" version="1" comment="libreoffice-gnome is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564698" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564699" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564700" version="1" comment="libreoffice-impress is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564701" version="1" comment="libreoffice-kde4 is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564702" version="1" comment="libreoffice-l10n-af is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564703" version="1" comment="libreoffice-l10n-ar is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564704" version="1" comment="libreoffice-l10n-ca is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564705" version="1" comment="libreoffice-l10n-cs is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564706" version="1" comment="libreoffice-l10n-da is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564707" version="1" comment="libreoffice-l10n-de is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564708" version="1" comment="libreoffice-l10n-en is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564709" version="1" comment="libreoffice-l10n-es is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564710" version="1" comment="libreoffice-l10n-fi is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564711" version="1" comment="libreoffice-l10n-fr is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564712" version="1" comment="libreoffice-l10n-gu is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564713" version="1" comment="libreoffice-l10n-hi is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564714" version="1" comment="libreoffice-l10n-hu is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564715" version="1" comment="libreoffice-l10n-it is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564716" version="1" comment="libreoffice-l10n-ja is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564717" version="1" comment="libreoffice-l10n-ko is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564718" version="1" comment="libreoffice-l10n-nb is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564719" version="1" comment="libreoffice-l10n-nl is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564720" version="1" comment="libreoffice-l10n-nn is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564721" version="1" comment="libreoffice-l10n-pl is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564722" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564723" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564724" version="1" comment="libreoffice-l10n-ru is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564725" version="1" comment="libreoffice-l10n-sk is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564726" version="1" comment="libreoffice-l10n-sv is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564727" version="1" comment="libreoffice-l10n-xh is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564728" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564729" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564730" version="1" comment="libreoffice-l10n-zu is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564731" version="1" comment="libreoffice-mailmerge is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564732" version="1" comment="libreoffice-math is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564733" version="1" comment="libreoffice-officebean is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564734" version="1" comment="libreoffice-pyuno is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564735" version="1" comment="libreoffice-sdk is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009515206" version="1" comment="libreoffice-share-linker is &lt;1-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564736" version="1" comment="libreoffice-voikko is &lt;4.1-2.26 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564737" version="1" comment="libreoffice-writer is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564738" version="1" comment="libreoffice-writer-extensions is &lt;5.0.4.2-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564740" version="1" comment="libvoikko1 is &lt;3.7.1-5.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564741" version="1" comment="myspell-af_NA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564742" version="1" comment="myspell-af_ZA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564743" version="1" comment="myspell-ar is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564744" version="1" comment="myspell-ar_AE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564745" version="1" comment="myspell-ar_BH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564746" version="1" comment="myspell-ar_DZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564747" version="1" comment="myspell-ar_EG is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564748" version="1" comment="myspell-ar_IQ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564749" version="1" comment="myspell-ar_JO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564750" version="1" comment="myspell-ar_KW is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564751" version="1" comment="myspell-ar_LB is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564752" version="1" comment="myspell-ar_LY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564753" version="1" comment="myspell-ar_MA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564754" version="1" comment="myspell-ar_OM is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564755" version="1" comment="myspell-ar_QA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564756" version="1" comment="myspell-ar_SA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564757" version="1" comment="myspell-ar_SD is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564758" version="1" comment="myspell-ar_SY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564759" version="1" comment="myspell-ar_TN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564760" version="1" comment="myspell-ar_YE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564761" version="1" comment="myspell-be_BY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564762" version="1" comment="myspell-bg_BG is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564763" version="1" comment="myspell-bn_BD is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564764" version="1" comment="myspell-bn_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564765" version="1" comment="myspell-bs is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564766" version="1" comment="myspell-bs_BA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564767" version="1" comment="myspell-ca is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564768" version="1" comment="myspell-ca_AD is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564769" version="1" comment="myspell-ca_ES is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564770" version="1" comment="myspell-ca_ES_valencia is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564771" version="1" comment="myspell-ca_FR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564772" version="1" comment="myspell-ca_IT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564773" version="1" comment="myspell-cs_CZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564774" version="1" comment="myspell-da_DK is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564775" version="1" comment="myspell-de is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564776" version="1" comment="myspell-de_AT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564777" version="1" comment="myspell-de_CH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564778" version="1" comment="myspell-de_DE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564779" version="1" comment="myspell-dictionaries is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564780" version="1" comment="myspell-el_GR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564781" version="1" comment="myspell-en is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564782" version="1" comment="myspell-en_AU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564783" version="1" comment="myspell-en_BS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564784" version="1" comment="myspell-en_BZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564785" version="1" comment="myspell-en_CA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564786" version="1" comment="myspell-en_GB is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564787" version="1" comment="myspell-en_GH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564788" version="1" comment="myspell-en_IE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564789" version="1" comment="myspell-en_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564790" version="1" comment="myspell-en_JM is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564791" version="1" comment="myspell-en_MW is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564792" version="1" comment="myspell-en_NA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564793" version="1" comment="myspell-en_NZ is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564794" version="1" comment="myspell-en_PH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564795" version="1" comment="myspell-en_TT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564796" version="1" comment="myspell-en_US is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564797" version="1" comment="myspell-en_ZA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564798" version="1" comment="myspell-en_ZW is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564799" version="1" comment="myspell-es is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564800" version="1" comment="myspell-es_AR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564801" version="1" comment="myspell-es_BO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564802" version="1" comment="myspell-es_CL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564803" version="1" comment="myspell-es_CO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564804" version="1" comment="myspell-es_CR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564805" version="1" comment="myspell-es_CU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564806" version="1" comment="myspell-es_DO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564807" version="1" comment="myspell-es_EC is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564808" version="1" comment="myspell-es_ES is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564809" version="1" comment="myspell-es_GT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564810" version="1" comment="myspell-es_HN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564811" version="1" comment="myspell-es_MX is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564812" version="1" comment="myspell-es_NI is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564813" version="1" comment="myspell-es_PA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564814" version="1" comment="myspell-es_PE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564815" version="1" comment="myspell-es_PR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564816" version="1" comment="myspell-es_PY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564817" version="1" comment="myspell-es_SV is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564818" version="1" comment="myspell-es_UY is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564819" version="1" comment="myspell-es_VE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564820" version="1" comment="myspell-et_EE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564821" version="1" comment="myspell-fr_BE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564822" version="1" comment="myspell-fr_CA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564823" version="1" comment="myspell-fr_CH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564824" version="1" comment="myspell-fr_FR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564825" version="1" comment="myspell-fr_LU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564826" version="1" comment="myspell-fr_MC is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564827" version="1" comment="myspell-gu_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564828" version="1" comment="myspell-he_IL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564829" version="1" comment="myspell-hi_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564830" version="1" comment="myspell-hr_HR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564831" version="1" comment="myspell-hu_HU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564832" version="1" comment="myspell-it_IT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564833" version="1" comment="myspell-lightproof-en is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564834" version="1" comment="myspell-lightproof-hu_HU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564835" version="1" comment="myspell-lightproof-pt_BR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564836" version="1" comment="myspell-lightproof-ru_RU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564837" version="1" comment="myspell-lo_LA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564838" version="1" comment="myspell-lt_LT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564839" version="1" comment="myspell-lv_LV is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564840" version="1" comment="myspell-nb_NO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564841" version="1" comment="myspell-nl_BE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564842" version="1" comment="myspell-nl_NL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564843" version="1" comment="myspell-nn_NO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564844" version="1" comment="myspell-no is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564845" version="1" comment="myspell-pl_PL is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564846" version="1" comment="myspell-pt_AO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564847" version="1" comment="myspell-pt_BR is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564848" version="1" comment="myspell-pt_PT is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564849" version="1" comment="myspell-ro is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564850" version="1" comment="myspell-ro_RO is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564851" version="1" comment="myspell-ru_RU is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564852" version="1" comment="myspell-sk_SK is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564853" version="1" comment="myspell-sl_SI is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564854" version="1" comment="myspell-sr is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564855" version="1" comment="myspell-sr_CS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564856" version="1" comment="myspell-sr_Latn_CS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564857" version="1" comment="myspell-sr_Latn_RS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564858" version="1" comment="myspell-sr_RS is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564859" version="1" comment="myspell-sv_FI is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564860" version="1" comment="myspell-sv_SE is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564861" version="1" comment="myspell-te is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564862" version="1" comment="myspell-te_IN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564863" version="1" comment="myspell-th_TH is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564864" version="1" comment="myspell-vi is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564865" version="1" comment="myspell-vi_VN is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564866" version="1" comment="myspell-zu_ZA is &lt;20150827-23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564868" version="1" comment="python-importlib is &lt;1.0.2-0.8.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567389" version="1" comment="libssh2 is &lt;0.2-5.22.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009564877" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.6.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567390" version="1" comment="libvirt is &lt;1.2.5-12.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567391" version="1" comment="libvirt-client is &lt;1.2.5-12.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567392" version="1" comment="libvirt-client-32bit is &lt;1.2.5-12.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009132816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567393" version="1" comment="libvirt-doc is &lt;1.2.5-12.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567394" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567395" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567396" version="1" comment="mono-core is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567397" version="1" comment="mono-data is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567398" version="1" comment="mono-data-firebird is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567399" version="1" comment="mono-data-oracle is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567400" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567401" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567402" version="1" comment="mono-data-sybase is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567403" version="1" comment="mono-devel is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567404" version="1" comment="mono-extras is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567405" version="1" comment="mono-jscript is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567406" version="1" comment="mono-locale-extras is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567407" version="1" comment="mono-nunit is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567408" version="1" comment="mono-wcf is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567409" version="1" comment="mono-web is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567410" version="1" comment="mono-winforms is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567411" version="1" comment="monodoc-core is &lt;2.6.7-0.16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567412" version="1" comment="ntp is &lt;4.2.8p4-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567413" version="1" comment="ntp-doc is &lt;4.2.8p4-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567414" version="1" comment="openssh is &lt;6.6p1-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567415" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-13.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567416" version="1" comment="openssh-helpers is &lt;6.6p1-13.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567417" version="1" comment="openssh is &lt;6.6p1-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567418" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-16.4 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567419" version="1" comment="openssh-helpers is &lt;6.6p1-16.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567420" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567421" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567422" version="1" comment="openssl is &lt;0.9.8j-0.89.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567423" version="1" comment="libecpg6 is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567424" version="1" comment="libpq5 is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567425" version="1" comment="libpq5-32bit is &lt;9.4.6-0.14.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567426" version="1" comment="postgresql94 is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567427" version="1" comment="postgresql94-docs is &lt;9.4.6-0.14.3 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567428" version="1" comment="libldb1 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567429" version="1" comment="libldb1-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567430" version="1" comment="libsmbclient0 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567431" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567432" version="1" comment="libtalloc2 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567433" version="1" comment="libtalloc2-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567434" version="1" comment="libtdb1 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567435" version="1" comment="libtdb1-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567436" version="1" comment="libtevent0 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567437" version="1" comment="libtevent0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567438" version="1" comment="libwbclient0 is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567439" version="1" comment="libwbclient0-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567440" version="1" comment="samba is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567441" version="1" comment="samba-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567442" version="1" comment="samba-client is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567443" version="1" comment="samba-client-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567444" version="1" comment="samba-doc is &lt;3.6.3-67.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567445" version="1" comment="samba-krb-printing is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567446" version="1" comment="samba-winbind is &lt;3.6.3-67.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567447" version="1" comment="samba-winbind-32bit is &lt;3.6.3-67.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567448" version="1" comment="socat is &lt;1.7.0.0-1.18.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567449" version="1" comment="libtiff3 is &lt;3.8.2-141.163.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567450" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.163.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567451" version="1" comment="xen is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567452" version="1" comment="xen-doc-html is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567453" version="1" comment="xen-kmp-default is &lt;4.4.2_10_3.0.101_63-5.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567454" version="1" comment="xen-kmp-pae is &lt;4.4.2_10_3.0.101_63-5.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567455" version="1" comment="xen-libs is &lt;4.4.2_10-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567456" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567457" version="1" comment="xen-tools is &lt;4.4.2_10-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567458" version="1" comment="xen-tools-domU is &lt;4.4.2_10-5.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567459" version="1" comment="xen is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567460" version="1" comment="xen-doc-html is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567461" version="1" comment="xen-kmp-default is &lt;4.4.3_02_3.0.101_65-26.2 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567462" version="1" comment="xen-kmp-pae is &lt;4.4.3_02_3.0.101_65-26.2 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567463" version="1" comment="xen-libs is &lt;4.4.3_02-26.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567464" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567465" version="1" comment="xen-tools is &lt;4.4.3_02-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567466" version="1" comment="xen-tools-domU is &lt;4.4.3_02-26.2 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567467" version="1" comment="xen is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567468" version="1" comment="xen-doc-html is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567469" version="1" comment="xen-kmp-default is &lt;4.4.4_02_3.0.101_68-32.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567470" version="1" comment="xen-kmp-pae is &lt;4.4.4_02_3.0.101_68-32.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567471" version="1" comment="xen-libs is &lt;4.4.4_02-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567472" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567473" version="1" comment="xen-tools is &lt;4.4.4_02-32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567474" version="1" comment="xen-tools-domU is &lt;4.4.4_02-32.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567475" version="1" comment="xen is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567476" version="1" comment="xen-doc-html is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567477" version="1" comment="xen-kmp-default is &lt;4.4.3_06_3.0.101_65-29.1 for i586,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567478" version="1" comment="xen-kmp-pae is &lt;4.4.3_06_3.0.101_65-29.1 for i586" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567479" version="1" comment="xen-libs is &lt;4.4.3_06-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567480" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567481" version="1" comment="xen-tools is &lt;4.4.3_06-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009567482" version="1" comment="xen-tools-domU is &lt;4.4.3_06-29.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009133108"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sled-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-cmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread_ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bytefx-data-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sybase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-jscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-wcf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monodoc-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhtml-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-fig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbmuxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vm-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cabextract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuid-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>foomatic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-wallpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime-xine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdirstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-1_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-browse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ui-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-avc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-v4l2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-carlito-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmythes-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-share-linker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-voikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_AE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_BH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_DZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_EG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_IQ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_JO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_KW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_MA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_OM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_QA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_TN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_YE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-be_BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bg_BG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_BD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs_BA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_AD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-cs_CZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-da_DK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_AT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_DE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dictionaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-el_GR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_AU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_JM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_MW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_PH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_TT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_AR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_BO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_DO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_EC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_GT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_HN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_MX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_NI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_SV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_UY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_VE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-et_EE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_LU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_MC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gu_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-he_IL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hi_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hr_HR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-it_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lo_LA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lt_LT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lv_LV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nb_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_NL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nn_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pl_PL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_AO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro_RO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sk_SK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sl_SI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_FI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_SE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-th_TH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi_VN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-zu_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-importlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.5-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.97.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5-1.47.51.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.336-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.62-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.46-62.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.7-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.95-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.10-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_20-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.2_20_3.0.38_0.5-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.12-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02_3.0.38_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.166-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13_3.0.101_0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13_3.0.101_0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-75.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009101461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-0.12.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-15.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.2.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31.0-0.12.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.22-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.22-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-0.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.29.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38-18.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.97-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.72-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.19-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.10-120.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6c8-10.19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6c11-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.05-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.00-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.7-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-217.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.40-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.07-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.00-0.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-0.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.03.beta1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.4.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-2.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20150827-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009132816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009133108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
